-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IP Address SAN broken for TLS comms between nodes under 3.2.x #8206
Comments
Does any of the hosts resolve to |
No. I have NO DNS records matching any of these names. In my case, I have a script that generates an overloaded cert that could work for any of the hosts if I addressed them via DNS names, but I instead refer to all hosts by IP address in the etcd cmdline args. The script creates an x509 cert with all the names as you see here PLUS an IP Address SAN for 127.0.0.1 and the node's own IP address. So each node technically has a unique cert with its own IP plus the collection of DNS SANs which as I said are not being used. |
The IP SAN check would always do a DNS SAN check if DNS is given and the connection's IP is verified. Instead, don't check DNS entries if there's a matching iP. Fixes etcd-io#8206
The IP SAN check would always do a DNS SAN check if DNS is given and the connection's IP is verified. Instead, don't check DNS entries if there's a matching iP. Fixes #8206
The IP SAN check would always do a DNS SAN check if DNS is given and the connection's IP is verified. Instead, don't check DNS entries if there's a matching iP. Fixes #8206
The IP SAN check would always do a DNS SAN check if DNS is given and the connection's IP is verified. Instead, don't check DNS entries if there's a matching iP. Fixes #8206
The IP SAN check would always do a DNS SAN check if DNS is given and the connection's IP is verified. Instead, don't check DNS entries if there's a matching iP. Fixes etcd-io#8206
Team, I have 3 masters of which one was manually deleted, and it was brought up by auto scale group however, etcd started to throw below on the new master that joined cluster. Any hint? etcdmain: the server is already initialized as member before, starting as etcd member... the etcd.pem shows below |
Bootstrapping a 3.2.1 etcd cluster was giving me endless errors like this:
Jul 03 21:54:45 ip-10-xxx-xxx-xxx etcd[3213]: rejected connection from “10.yyy.yyy.yyy:37194” (tls: “10.yyy.yyy.yyy” does not match any of DNSNames [“*.etcd.ec2.xyz” “etcd.ec2.xyz” “etcd0” “etcd0.ec2.xyz” “etcd1” “etcd1.ec2.xyz” “etcd2” “etcd2.ec2.xyz” “etcd3” “etcd3.ec2.xyz” “etcd4” “etcd4.ec2.xyz” “etcd5” “etcd5.ec2.xyz”])
It complains of the IP address 10.yyy.yyy.yyy not being amongst the DNSNames of the TLS cert provided by 10.yyy.yyy.yyy. Meanwhile 10.yyy.yyy.yyy x509 cert does have its address in the IP Address section of the cert's SAN.
This is new behavior. I simply swapped out the 3.2.1 etcd binary for the newest 3.1.x (3.1.9) and restarted etcd on all 5 nodes, now the cluster is fully operational.
The text was updated successfully, but these errors were encountered: