-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SPIFFE Cert Validator documentation #17511
Comments
Hi @azdagron! Thanks for this. Actually, we can at least move this to The reason for |
For the security posture, I'm not sure how the job of this extension could be influenced by downstream or upstream? Seems like the only trusted party needs to be the SDS implementation? |
well, this is not about the SDS implementation (since the extension implementation is totally decoupled from SDS impl), but about the actual traffics handled by this extension - about the fact that all downstream/upstream tls connections are handled by this extensions. Having said that, maybe we could promote this to |
That seems fine to me, but it wasn't clear reading about the security_posture declaration if there was a formal process to getting that status elevated (i.e. security audit, fuzzing, etc). |
I guess there's no formal process - e.g. #15576 - I will just raise a PR so we can discuss with other maintainers. sg? |
Sounds good to me. Thanks @mathetake ! |
+@mathetake, who authored the extension.
The SPIFFE TLS CertValidator extension metadata currently marks the extension as WIP with an unknown security posture.
This results in cautionary text being added to the documentation. I'm totally on board with setting correct expectations with consumers. I'm also very interested in the extension moving into a more trusted position.
What is the process to go through to get these changed to more favorable values?
The text was updated successfully, but these errors were encountered: