-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
mTLS currently broken outside of TLSStrict
#296
Comments
Thanks for filing this. Technically 463a0e3 was a partial revert to fix a previous regression. To my understanding there has never been a mode where:
Given that the number of users of mtls is very low and the number of people that use the webui is quite high, I picked the lesser of two evils. Openssl man pages shows that there's an option, SSL_VERIFY_POST_HANDSHAKE, that might be able to handle this use case, but it appears to be more complex than just enabling the option, and requires some level of connection code to handle it. Alternatively, we could try to detect the browser at the TLS connection, but a wireshark dump of the data didn't show anything obvious that we could use to identify "this is a browser". Would love some help to fix this for all use cases. |
Understand. Was raising this partially so it was known and tracked. Could we add |
I'm not sure I understand. If tls strict works, just use that? It's already runtime settable. |
Using TLS strict disables password based authentication. We would still like that as an alternative method. |
I'd probably rather have a separate option, and at least some exploration (could be only on paper)of whether post handshake requests could solve this in a way that works in all cases. The hope is that this option doesn't have to live very long. Maybe request_client_certificate{Unconditionally, strict_only} ? |
This is what I meant for a quick change that gets us (Meta) back to previous state: remote: https://gerrit.openbmc.org/c/openbmc/bmcweb/+/75898 ssl_key_handler: enable verify_peer for Meta TLS mode [NEW] |
Is this the right place to submit this?
Bug Description
Running Redfish operations with mTLS enabled currently
401 Unauthorized
, unless explicitly settingTLSStrict: true
in thebmcweb_persistent_data.json
.curl --include --key $KEY_PATH --cert $CERT_PATH https://bmcdevice/redfish/v1/Systems/system
This was introduced with 463a0e3 and appears to be fixed by reverting.
The current bmcweb compile modifications and
PACKAGECONFIG
can be seen at https://github.com/openbmc/openbmc/blob/56a1db99ffbce908d8e78e0f5540f5db55cb546f/meta-facebook/recipes-phosphor/interfaces/bmcweb_%25.bbappend#L4 .Version
Additional Information
No response
The text was updated successfully, but these errors were encountered: