-
Notifications
You must be signed in to change notification settings - Fork 465
kube-aws SSL certs are not production worthy #420
Comments
I agree with you on this, but I know its a balance of proper security and usability of the tool. Now that we have reproducible assets, is there a flow for redeploying your certs? |
@pieterlange I've added "Cluster PKI" to the production quality checklist. Kubelet nodes should generate their own private keys and submit CSRs to a signing entity. In the near future, that remote signing (along with the approval queue) functionality will be built into the control plane. See Proposal for Kubelet TLS bootstrapping. The approach of having Kubelet's generate their own keys and submit CSRs has a number of advantages over our current approach of pre-generating all the cryptographic assets.
|
Missed the work being done on this in kubernetes itself. Looks like that's the better approach! 👍
Certainly! Some kind of ACME (letsencrypt) process where the nodes self provision looks like a big improvement in this area. |
I'm going to close this as this is also captured in: #340 Please re-open if necessary. |
I've been snatching components from the kube-aws tool to make my own deployment workflow, but after the recent kubernetes blogpost i decided to re-evaluate kube-aws. Now, the tool has come a long way and it's the best off the shelf tool available but the big note on the docs should be enough to prevent a lot of people from using the tool:
Other than really pointing out to people that they'd need to secure (limit access, backup, ..) these assets themselves, what is the point of this limitation? I understand the TLS PKI underpins a lot of the security in the cluster, but is it really safer to let people figure out the solution to this problem for themselves?
The text was updated successfully, but these errors were encountered: