-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Envoy Client Certs for Ext Auth and Backend TLS #2536
Comments
ptal @envoyproxy/gateway-maintainers |
EG doesn't use a global root ca like Istio does. So the problem of the first two approaches is that existing ext auth and jwt services may not be able to verify the client certs. |
@zhaohuabing imo its a matter of sharing the CA (which is meant to be shared for validating trust anchor) with those entities (ext auth svc and backend) |
Option 1: it's possible (not 100% sure) that a server cert cannot always be used as a client cert, e.g. if it doesn't have the appropriate extended key usage Option 2 limits flexibility and option 3 creates a bit of duplication. I think that they're ok as mid-term mitigations. I think that in one of the community meetings, we discussed the following option as well:
|
another option is defining the envoy certs within the EnvoyProxy API which is in line with the upstream discussion |
This issue has been automatically marked as stale because it has not had activity in the last 30 days. |
suggest waiting for upstream to align on naming kubernetes-sigs/gateway-api#2910 |
With the merge of the above, should we proceed with for something like:
|
Fixed with #3218 |
my bad, reopening this one |
/assign |
closed in favor of #3441 |
Description:
Raising this PR to make a decision on which client certs to use when originating a TLS connection to ext Auth and Backend TLS (relates to kubernetes-sigs/gateway-api#2743)
Option 1
Reuse Listener (Downstream) certs
Option 2
Define a common proxy cert in the
EnvoyProxy
configOption 3 (not possible today)
Define certs in each config
The text was updated successfully, but these errors were encountered: