Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide a Root CA when creating/updating service broker #825

Closed
drnic opened this issue May 23, 2017 · 11 comments
Closed

Provide a Root CA when creating/updating service broker #825

drnic opened this issue May 23, 2017 · 11 comments

Comments

@drnic
Copy link
Contributor

drnic commented May 23, 2017

When I register or update a service broker, I'd like to offer https:// URLs to my broker but the SSL certs are often self-signed. I'd like to be able to have users register my broker with the matching root CA for the SSL/TLS certs please.

Currently, if the service broker has self-signed certs then I'm required to downgrade to accessing/registering the broker via http://

@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this:

https://www.pivotaltracker.com/story/show/145909391

The labels on this github issue will be updated when the story is started.

@zrob
Copy link
Contributor

zrob commented May 24, 2017

@drnic We're putting together a track of work to remove the skip_cert_verify option such that we are secure everywhere by default. The service broker interaction is one of the stickier ones since we can't supply CAs in a bosh manifest. This sounds like it could be our solution.

@mattmcneeney
Copy link

Hey @drnic
We're just taking a look at this issue; is this still something that is important for you?
Thanks!

@drnic
Copy link
Contributor Author

drnic commented Sep 3, 2018 via email

@zrob
Copy link
Contributor

zrob commented Sep 12, 2018

This still sounds valuable to me. We've been working on turning http to https everywhere we can. This can be done for brokers if the brokers are using a cert that the vm cc is running on trusts it, but doesn't allow operators to easily opt-in to self-signed certs without putting them into the cc vm trust store.

@mattmcneeney
Copy link

mattmcneeney commented Sep 13, 2018 via email

@mattmcneeney
Copy link

Closing for now, but will reopen if this becomes a blocker for anyone!

@tcdowney
Copy link
Member

tcdowney commented Oct 9, 2020

Reopening this since cf-for-k8s redirects http to https by default. This makes this and issue since users can't just downgrade to http when they're trying to interact with on-platform brokers.

See this Slack convo where @reneighbor ran into this today:
https://cloudfoundry.slack.com/archives/C017LDM6KTQ/p1602280933144500

cc @piyalibanerjee @Gerg

@tcdowney tcdowney reopened this Oct 9, 2020
@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this:

https://www.pivotaltracker.com/story/show/175213714

The labels on this github issue will be updated when the story is started.

@jamespollard8
Copy link
Contributor

Now that we (the cf-for-k8s team) understand this better, we're thinking that we made need a K8s implementation of this: https://bosh.io/docs/trusted-certs/, so that we could potentially use a self-signed CA by adding it to the trust store for [at least] the necessary containers.

Does that make sense to you, cake folks?

@sethboyles
Copy link
Member

Closing this since cf-for-k8s is no longer under active development

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

10 participants