-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for per-repository truststore #77081
Comments
Pinging @elastic/es-distributed (Team:Distributed) |
@DaveCTurner, do you have an idea of how this should look in configuration? Would it simply be a matter of adding support for |
Yes that's what I'd envisioned. The various SDKs typically don't let you get access to the low-level details of the connection so we can only really customise things to the extend that the API permits it. For instance the S3 SDK lets us pass in a |
It's been a couple of years since I looked, but last time I investigated this, it looked like we might be able to add something like this to
|
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes elastic#65034 Relates elastic#77081 Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes #65034 Relates #77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes elastic#65034 Relates elastic#77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes elastic#65034 Relates elastic#77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes elastic#65034 Relates elastic#77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes #65034 Relates #77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes #65034 Relates #77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
Today it's not clear how to tell Elasticsearch to trust an S3-compatible repository that presents a certificate issued by a private or nonstandard CA. This commit expands the docs to say how. Supersedes #65034 Relates #77081 Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]> Co-authored-by: Joost De Cock <[email protected]>
What about a global setting to configure all TLS CA on 1 shot? (inter node security, any web hook, snapshot etc...) |
We used to have that (though not for snapshots). We removed it because it caused more problems than it solved. It is rarely the case that you actually want one CA for all of those different contexts. The CA you trust for internode security should be different than the CA you trust for webhooks. Attempting to configure them together is almost always a mistake. We can continue this conversation on the forums: https://discuss.elastic.co/t/set-a-global-tls-ca-for-security-snapshot-reindex-etc/297389 |
Any news on this? We need to add our ca certs to |
If we communicate with a repository over TLS then today we use the default (JVM-wide) truststore to validate the certificate chain that the repository presents to prove its identity. In most of the other contexts that use TLS we typically let users specify which truststore to use in order to support very fine-grained control of the certificates that are trusted in each context. I think we should permit users to configure a per-repository (or maybe per-repo-client) trust store to give the same level of control over traffic to snapshot repositories
This is particularly thinking of S3-compatible repositories, I'm not sure we need this for most of the other implementations right now.
Relates https://discuss.elastic.co/t/configure-certificate-for-repository-s3-with-ceph/282645
Workaround: Note that the JVM-wide truststore is under the user's control so for now they can work around this missing feature by adding a certificate for their own custom CAs there.
The text was updated successfully, but these errors were encountered: