server: pod-to-pod communication should use same TLS cert as pod-kv comms, not node.crt #71106
Labels
A-security
A-server-networking
Pertains to network addressing,routing,initialization
C-bug
Code not up to spec/doc, specs & docs deemed correct. Solution expected to change code/behavior.
T-server-and-security
DB Server & Security
Describe the problem
Currently pod-pod communication load and use
node.crt
.It only requires the cert to have
CN=node
and does not perform checks further.This is problematic in two ways:
CN=node
on the filesystem which, if leaked, can be used to establish SQL connections withnode
-level privilegeExpected outcome
We should use the same TLS cert for pod-pod connections as used for pod-kv connections.
And also we should verify upon incoming pod-pod connections that the tenant ID in the cert matches the local tenant ID.
The text was updated successfully, but these errors were encountered: