-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add DataPlan-Trust implementation for Activator #13968
Comments
As an operator why would I choose |
|
You will add |
The code also seems to support what we need for a future dataplane-trust = "identity" since identity adds on top of mutual trust. The main difference between the two appears at the ingress. However, the focus now is on TLS and verifying identities at each hop. The suggested wip #13969 treats:
So identity and mutual are the same at this point when we make changes to the activator and queue |
Given internal encryption is 'alpha' I wonder if we skip supporting @nak3 do you have input on this feature's usage |
Yeah, I think it is alright to replace current internal-encryption with |
I can't see a way to ensure that the new configuration will be implemented smoothly at this point.
Moving the original |
If the new configuration will not be implemented smoothly, I think we should keep With said, for moving it from Alpha to Beta, we will add |
#11906 was initially planned to be implemented using Support for |
Sorry I referred to this specific comment #11906 (comment) |
When you say |
Sorry I misunderstood about |
We talked a bit about this in the security WG meeting. To summarize, we believe that all the following are true:
Given that we're currently publishing support for the
Once Does that make sense? Is there other data that we're missing? |
To clarify, the recommendation for 2023, coming out of the recent Security WG meeting is:
As a future plan, we recommend to continue making an effort to support Trust= |
This is where I disagree. Only Kourier supports the internal encryption feature. Contour has code but we have zero test coverage. This feature is alpha and we have affordances to forgo the current implementation and skip this complex migration. Additionally, there is no documentation on the website about this feature.
I'm confused is this a configuration option the user sets explicitly? This seems unnecessary for Istio and Kourier because they can support multiple SANs for a backend the activator should just move in and out of the data path when For GatewayAPI & Contour we should default the activator to always be in the data path when I'm not convinced that we should support |
As indicated above the Security WG opted to make TLS our default sooner rather than later (and for very good reasons). From our analysis, the path for getting to TLS as the Serving default is using @dprotaso (and please correct me if I am misinterpreted your thoughts) clearly prefers to drop I think we all agree on the facts (I listed everything I could collect below), and that we have two options: Option A
Option B
I believe we all agree on the many items below (please speak out if not):
Still, although we seem to all agree on the above list, we disagree on the question of what should we do. I am opting for a decision (one way or another) such that I can clean my desk form this effort as I am gradually focusing more and more on Zero-Trust aspects of K8s and Knative. @evankanderson, @dprotaso, @nainaz @ReToCode @skonto @nak3, @rhuss, @psschwei |
I've been pretty clear that we should drop
Like I stated above - For Contour/Gateway API we can wait until their API can support such a change. It would be great if folks could engage/discuss/contribute in those respective projects and communities. |
@dprotaso - Since this is going nowhere, lets close the 2 respective PRs, consider it a POC that others can use as reference future Serving TLS support. |
What's not clear about my position? I've stated previously:
|
It boils down to 'A Bird in the Hand is Worth Two in the Bush'. |
This issue is stale because it has been open for 90 days with no |
See serving #11906
See https://docs.google.com/document/d/1XE7UzgQlVVtAb7ULSqOyKCaIHtm8zMF35ainp1JmwyY/
This issue focuses on adding
DataPlan-Trust
support for Activator and Queue including options for:dataplane-trust = "minimal" (common names for all namespaces)
dataplane-trust = "enabled" (per namespace)
dataplane-trust = "mutual" mTLS
It includes the necessary changes needed for:
otherwise, Activator Client will verify server certificate has the name "kn-user-<namespace>"
Until such time that all ingresses use the new DataPlane Routing certificate, we should also accept "data-plane.knative.dev"
The text was updated successfully, but these errors were encountered: