--- discourse: 13114,15142 relatedlinks: https://www.youtube.com/watch?v=6O0q3rSWr8A --- (authentication)= # Remote API authentication Remote communications with the LXD daemon happen using JSON over HTTPS. This requires the LXD API to be exposed over the network; see {ref}`server-expose` for instructions. To be able to access the remote API, clients must authenticate with the LXD server. The following authentication methods are supported: - {ref}`authentication-tls-certs` - {ref}`authentication-openid` (authentication-tls-certs)= ## TLS client certificates ```{youtube} https://www.youtube.com/watch?v=4iNpiL-lrXU ``` When using {abbr}`TLS (Transport Layer Security)` client certificates for authentication, both the client and the server will generate a key pair the first time they're launched. The server will use that key pair for all HTTPS connections to the LXD socket. The client will use its certificate as a client certificate for any client-server communication. To cause certificates to be regenerated, simply remove the old ones. On the next connection, a new certificate is generated. ### Communication protocol The supported protocol must be TLS 1.3 or better. It's possible to force LXD to accept TLS 1.2 by setting the `LXD_INSECURE_TLS` environment variable on both client and server. However this isn't a supported setup and should only ever be used when forced to use an outdated corporate proxy. All communications must use perfect forward secrecy, and ciphers must be limited to strong elliptic curve ones (such as ECDHE-RSA or ECDHE-ECDSA). Any generated key should be at least 4096 bit RSA, preferably 384 bit ECDSA. When using signatures, only SHA-2 signatures should be trusted. Since we control both client and server, there is no reason to support any backward compatibility to broken protocol or ciphers. (authentication-trusted-clients)= ### Trusted TLS clients You can obtain the list of TLS certificates trusted by a LXD server with [`lxc config trust list`](lxc_config_trust_list.md). Trusted clients can be added in either of the following ways: - {ref}`authentication-add-certs` - {ref}`authentication-trust-pw` - {ref}`authentication-token` The workflow to authenticate with the server is similar to that of SSH, where an initial connection to an unknown server triggers a prompt: 1. When the user adds a server with [`lxc remote add`](lxc_remote_add.md), the server is contacted over HTTPS, its certificate is downloaded and the fingerprint is shown to the user. 1. The user is asked to confirm that this is indeed the server's fingerprint, which they can manually check by connecting to the server or by asking someone with access to the server to run the info command and compare the fingerprints. 1. The server attempts to authenticate the client: - If the client certificate is in the server's trust store, the connection is granted. - If the client certificate is not in the server's trust store, the server prompts the user for a token or the trust password. If the provided token or trust password matches, the client certificate is added to the server's trust store and the connection is granted. Otherwise, the connection is rejected. To revoke trust to a client, remove its certificate from the server with [`lxc config trust remove `](lxc_config_trust_remove.md). TLS clients can be restricted to a subset of projects, see {ref}`restricted-tls-certs` for more information. (authentication-add-certs)= #### Adding trusted certificates to the server The preferred way to add trusted clients is to directly add their certificates to the trust store on the server. To do so, copy the client certificate to the server and register it using [`lxc config trust add `](lxc_config_trust_add.md). (authentication-trust-pw)= #### Adding client certificates using a trust password To allow establishing a new trust relationship from the client side, you must set a trust password ({config:option}`server-core:core.trust_password`) for the server. Clients can then add their own certificate to the server's trust store by providing the trust password when prompted. In a production setup, unset `core.trust_password` after all clients have been added. This prevents brute-force attacks trying to guess the password. (authentication-token)= #### Adding client certificates using tokens You can also add new clients by using tokens. This is a safer way than using the trust password, because tokens expire after a configurable time ({config:option}`server-core:core.remote_token_expiry`) or once they've been used. To use this method, generate a token for each client by calling [`lxc config trust add`](lxc_config_trust_add.md), which will prompt for the client name. The clients can then add their certificates to the server's trust store by providing the generated token when prompted for the trust password. ```{note} If your LXD server is behind NAT, you must specify its external public address when adding it as a remote for a client: lxc remote add When you are prompted for the admin password, specify the generated token. When generating the token on the server, LXD includes a list of IP addresses that the client can use to access the server. However, if the server is behind NAT, these addresses might be local addresses that the client cannot connect to. In this case, you must specify the external address manually. ``` Alternatively, the clients can provide the token directly when adding the remote: [`lxc remote add `](lxc_remote_add.md). (authentication-pki)= ### Using a PKI system In a {abbr}`PKI (Public key infrastructure)` setup, a system administrator manages a central PKI that issues client certificates for all the LXD clients and server certificates for all the LXD daemons. In PKI mode, TLS authentication requires that client certificates are signed be the {abbr}`CA (Certificate authority)`. This requirement does not apply to clients that authenticate via [OIDC](authentication-openid). The steps for enabling PKI mode differ slightly depending on whether you use an ACME provider in addition (see {ref}`authentication-server-certificate`). `````{tabs} ````{group-tab} Only PKI If you use a PKI system, both the server and client certificates are issued by intermediate CA(s). The `client.ca` file contains the certificate used by the client to verify the server certificate it receives when making a connection to a remote. The `server.ca` file contains the certificate used by the server to verify the client certificate associated with an incoming connection. Both files contain trust anchors used to evaluate if the received leaf certificate from the other end of the connection is to be trusted or not. If the leaf certificate's chain of trust leads to one of the trusted anchors it will be trusted (unless revoked). 1. Add the CA certificate to all machines: - Place the `client.ca` file in the clients' configuration directories (`~/.config/lxc` or `~/snap/lxd/common/config` for snap users). - Place the `server.ca` file in the server's configuration directory (`/var/lib/lxd` or `/var/snap/lxd/common/lxd` for snap users). ```{note} In a cluster setup, the CA certificate must be named `cluster.ca`, and the same file must be added to all cluster members. ``` 1. Place the certificates issued by the CA in the clients' configuration directories, replacing the automatically generated `client.crt` and `client.key` files. 1. If you want clients to automatically trust the server, place the certificates issued by the CA in the server's configuration directory, replacing the automatically generated `server.crt` and `server.key` files. ```{note} In a cluster setup, the certificate files must be named `cluster.crt` and `cluster.key`. They must be identical on all cluster members. ``` When a client adds a PKI-enabled server or cluster as a remote, it checks the server certificate and prompts the user to trust the server certificate only if the certificate has not been signed by the CA. 1. Restart the LXD daemon. ```` ````{group-tab} PKI and ACME If you use a PKI system alongside an ACME provider, the server certificates are issued by the ACME provider, and the client certificates are issued by a secondary CA. 1. Place the CA certificate for the server (`server.ca`) in the server's configuration directory (`/var/lib/lxd` or `/var/snap/lxd/common/lxd` for snap users), so that the server can authenticate the clients. ```{note} In a cluster setup, the CA certificate must be named `cluster.ca`, and the same file must be added to all cluster members. ``` 1. Place the certificates issued by the CA in the clients' configuration directories, replacing the automatically generated `client.crt` and `client.key` files. 1. Restart the LXD daemon. ```` ````` #### Trusting certificates CA-signed client certificates are not automatically trusted. You must still add them to the server in one of the ways described in {ref}`authentication-trusted-clients`. To automatically trust CA-signed client certificates, set the {config:option}`server-core:core.trust_ca_certificates` server configuration to true. When `core.trust_ca_certificates` is enabled, any new clients with a CA-signed certificate will have full access to LXD. #### Revoking certificates To revoke certificates via the PKI, place a certificate revocation list in the server's configuration directory as `ca.crl` and restart the LXD daemon. A client with a CA-signed certificate that has been revoked, and is present in `ca.crl`, will not be able to authenticate with LXD, nor add LXD as a remote via [mutual TLS](authentication-trusted-clients). (authentication-openid)= ## OpenID Connect authentication LXD supports using [OpenID Connect](https://openid.net/developers/how-connect-works/) to authenticate users through an {abbr}`OIDC (OpenID Connect)` Identity Provider. To configure LXD to use OIDC authentication, set the [`oidc.*`](server-options-oidc) server configuration options. Your OIDC provider must be configured to enable the [Device Authorization Grant](https://oauth.net/2/device-flow/) type. To add a remote pointing to a LXD server configured with OIDC authentication, run [`lxc remote add `](lxc_remote_add.md). You are then prompted to authenticate through your web browser, where you must confirm that the device code displayed in the browser matches the device code that is displayed in the terminal window. The LXD client then retrieves and stores an access token, which it provides to LXD for all interactions. The identity provider might also provide a refresh token. In this case, the LXD client uses this refresh token to attempt to retrieve another access token when the current access token has expired. When an OIDC client initially authenticates with LXD, it does not have access to the majority of the LXD API. OIDC clients must be granted access by an administrator, see {ref}`fine-grained-authorization`. (authentication-server-certificate)= ## TLS server certificate LXD supports issuing server certificates using {abbr}`ACME (Automatic Certificate Management Environment)` services, for example, [Let's Encrypt](https://letsencrypt.org/). To enable this feature, set the following server configuration: - {config:option}`server-acme:acme.domain`: The domain for which the certificate should be issued. - {config:option}`server-acme:acme.email`: The email address used for the account of the ACME service. - {config:option}`server-acme:acme.agree_tos`: Must be set to `true` to agree to the ACME service's terms of service. - {config:option}`server-acme:acme.ca_url`: The directory URL of the ACME service. By default, LXD uses "Let's Encrypt". For this feature to work, LXD must be reachable from port 80. This can be achieved by using a reverse proxy such as [HAProxy](http://www.haproxy.org/). Here's a minimal HAProxy configuration that uses `lxd.example.net` as the domain. After the certificate has been issued, LXD will be reachable from `https://lxd.example.net/`. ``` # Global configuration global log /dev/log local0 chroot /var/lib/haproxy stats socket /run/haproxy/admin.sock mode 660 level admin stats timeout 30s user haproxy group haproxy daemon ssl-default-bind-options ssl-min-ver TLSv1.2 tune.ssl.default-dh-param 2048 maxconn 100000 # Default settings defaults mode tcp timeout connect 5s timeout client 30s timeout client-fin 30s timeout server 120s timeout tunnel 6h timeout http-request 5s maxconn 80000 # Default backend - Return HTTP 301 (TLS upgrade) backend http-301 mode http redirect scheme https code 301 # Default backend - Return HTTP 403 backend http-403 mode http http-request deny deny_status 403 # HTTP dispatcher frontend http-dispatcher bind :80 mode http # Backend selection tcp-request inspect-delay 5s # Dispatch default_backend http-403 use_backend http-301 if { hdr(host) -i lxd.example.net } # SNI dispatcher frontend sni-dispatcher bind :443 mode tcp # Backend selection tcp-request inspect-delay 5s # require TLS tcp-request content reject unless { req.ssl_hello_type 1 } # Dispatch default_backend http-403 use_backend lxd-nodes if { req.ssl_sni -i lxd.example.net } # LXD nodes backend lxd-nodes mode tcp option tcp-check # Multiple servers should be listed when running a cluster server lxd-node01 1.2.3.4:8443 check server lxd-node02 1.2.3.5:8443 check server lxd-node03 1.2.3.6:8443 check ``` ## Failure scenarios In the following scenarios, authentication is expected to fail. ### Server certificate changed The server certificate might change in the following cases: - The server was fully reinstalled and therefore got a new certificate. - The connection is being intercepted ({abbr}`MITM (Machine in the middle)`). In such cases, the client will refuse to connect to the server because the certificate fingerprint does not match the fingerprint in the configuration for this remote. It is then up to the user to contact the server administrator to check if the certificate did in fact change. If it did, the certificate can be replaced by the new one, or the remote can be removed altogether and re-added. ### Server trust relationship revoked The server trust relationship is revoked for a client if another trusted client or the local server administrator removes the trust entry for the client on the server. In this case, the server still uses the same certificate, but all API calls return a 403 code with an error indicating that the client isn't trusted. ## Related topics {{security_exp}} {{security_how}}