-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ECDSA private key #984
Comments
i need to do some investigation for the stakes here, but for now my answer is that EC will not be supported any time soon (don't quote me on that). |
To repro: ca-config.json {"signing":{"default":{"expiry":"43800h"},"profiles":{"server":{"expiry":"43800h","usages":["signing","key encipherment","server auth","client auth"]},"client":{"expiry":"43800h","usages":["signing","key encipherment","client auth"]},"peer":{"expiry":"43800h","usages":["signing","key encipherment","server auth","client auth"]}}}} ca-csr.json {"CN":"etcd","key":{"algo":"ecdsa","size":256}} Then use cfssl: cfssl gencert -initca -config ca-config.json ca-csr.json | cfssljson -bare ca -
mv ca.pem ca.crt
mv ca-key.pem ca.key Now try to use this CA cert: kubeadm alpha phase certs all --cert-dir $PWD
|
@neolit123 What led you to your expectation that this would not be coming soon? Do you see some specific blocker? |
After actually looking at that PR, there was no working code removed, just some placeholders. |
i think the biggest blocker is that this is a relatively low priority task and the kubeadm team is busy. i did some investigation and it feels like the rest of kubernetes is ECDSA "ready". |
/assign @liztio |
Looks like the |
I'd like to tackle this if nobody is working on it. |
@fabriziopandini: GitHub didn't allow me to assign the following users: rojkov. Note that only kubernetes members and repo collaborators can be assigned and that issues/PRs can only have 10 assignees at the same time. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @rojkov |
The corresponding PR is kubernetes/kubernetes#76390. |
FEATURE REQUEST
I was trying to deploy a new cluster with autogenerated EC CAs when I discovered that kubeadm waits for CA key to be in RSA format.
I thought maybe there is no capabilities to generate EC certificates in kubeadm, so I've generated whole chain: ca, frontproxy-ca, apiserver, apiserver-kubelet-client, front-proxy-client and sa private and public keys.
Now kubeadm stopped on private key to apiserver certificate (while accepting ECDSA certificate itself)
So the feature request: please add support for EC keys if underlying infrastructure is able to support it.
The text was updated successfully, but these errors were encountered: