Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kubernetes as a client TLS validation question #6119

Closed
pospim19 opened this issue Nov 27, 2018 · 3 comments
Closed

Kubernetes as a client TLS validation question #6119

pospim19 opened this issue Nov 27, 2018 · 3 comments

Comments

@pospim19
Copy link

Does Kubernetes (installed using KOPS 1.10+), as a client, perform TLS validation, and in what form? This scopes any and all connections between the Kubernetes nodes, as well as connection to external TLS/HTTPS services, if applicable. What root CA does the client trust? Does the client perform certificate validity and signature check? Hostname check? Etc.

@justinsb
Copy link
Member

justinsb commented Dec 7, 2018

Honestly, there's multiple strategies used, and it's possible to override validation. Kops doesn't configure all the validation it could & should, and I'm proposing that we make kops the most secure configuration available.

There's a great list in #6150 , so I'd like to track these efforts there. I'll close this, if that's OK!

@justinsb justinsb closed this as completed Dec 7, 2018
@du291
Copy link

du291 commented Dec 10, 2018

There's a great list in #6150 , so I'd like to track these efforts there. I'll close this, if that's OK!

Hello, thanks for the response. I see the CIS benchmark mentioned in #6150 as helpful, but do not see a straightforward mapping to this question. Which settings affect which TLS connections and in which way?

@du291
Copy link

du291 commented Jan 7, 2019

@justinsb any thoughts on the above? Could we potentially reopen this issue until the concerns are cleared?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants