-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature] support CRL (certificate revocation list) files #4900
Comments
This is actually reformulated and reopened #2996 |
@shvar Nomad supports live reloading TLS configuration (and it terminates existing connections). When a cert is compromised, you could issue a new one. The workflow would look something like below
This is more complex than having Nomad support a CRL, but I wanted to mention this workaround to you as something you can do right now. We'll consider adding this feature in a future release. We also want to build support for better Vault integration so that Nomad clients/servers can use vault as the secret engine to generate certs. |
#4901 addresses this issue using ACL |
Is that true @preetapan ? In my experience, Nomad cannot live reload a CA change specifically because it doesn't update its trust anchors. Last tested on 0.8.4. |
Preface
Nomad is currently using two systems for securing its protocols.
Use case
We have to use nomad agents over the internet and would like to protect our communication channels. So, mTLS sounds like a very natural choice. However, some of the agents could be compromised and we would like to be able to revoke their certificates.
Supporting a revocation list could help to avoid building a system for rotation low TTL certs.
What do you think?
P. S. And Vault already has a CRL support.
The text was updated successfully, but these errors were encountered: