-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should CP disconnect DP when token is expired or revoked? #1298
Comments
Revocation and expiration should be the same. We probably also should expose data to the dataplane-insight that shows signing key serial number and expiration date. |
This issue was inactive for 30 days it will be reviewed in the next triage meeting and might be closed. |
I would like to bring this issue back to life. I think it is important for a healthy mesh. |
@jakubdyszkiewicz is this fixed now? |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
Partially fixed by kumahq/kuma#4685 We now auth with every single DiscoveryRequest, so CP will disconnect DPP with a revoked or expired token on the next DiscoveryRequest. That means that if there is no new config, DPP can still be connected for some time before it happens. What we should consider is whether we want to immediately disconnect DPP whose token expired or the token we just revoked. Technically dropping the connection immediately does not change much from the DPP perspective. Even if we drop the connection sooner, Envoy will still have the config. |
|
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
Description
Right now we authenticate the DP on the first DiscoveryRequest. Assuming that NodeID between DiscoveryRequest is stable, we don't need to authenticate it again.
With this PR kumahq/kuma#3376 we introduced expiration and revocation.
I think we should disconnect DP when the token is revoked but what about the expired token?
The text was updated successfully, but these errors were encountered: