Secure etcd API /w TLS on kubeadm init #594
Labels
area/security
kind/feature
Categorizes issue or PR as related to a new feature.
priority/important-longterm
Important over the long term, but may not be staffed and/or may need multiple releases to complete.
sig/cluster-lifecycle
Categorizes an issue or PR as relevant to SIG Cluster Lifecycle.
triaged
Milestone
/kind feature
/area etcd
/area kubeadm
/area security
/sig cluster-lifecycle
What happened:
When initializing a cluster with kubeadm, the local connection to etcd is insecure.
Anyone logged into the master machine has implicit root access via the etcd port.
What you expected to happen:
kubeadm should generate TLS identities for etcd.
The connection should be secure -- unaccessible without valid credentials.
Anything else we need to know?:
This was discussed in in the kubeadm working group: Wed 13 December 2017.
Functionality:
Considerations:
Shoud we use the existing kubernetes CA or create a dedicated etcd CA ?
The text was updated successfully, but these errors were encountered: