-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Managed certificates do not include intermediate certs #709
Comments
We’ll have this fixed before the managed certs feature officially enters public preview. Thanks |
As in the board the feature entered public preview, so this is fixed? |
@anthonychu can you confirm whether this is fixed? |
@rhuanbarreto I have about 16 managed certificates across different container apps and environments. I can confirm that the intermediate certificates are served in a similar manner as to when brining in your own certificate. However, the order of certificates seems to still be wrong. This happens even when you bring your own certificate but not with the default You should not have an issue using these. Maybe I should also add, that if you are using bicep for deployment it is likely to fail after almost 2 hours but the certificate has been provisioned. I solve this by cancelling the deployment once the provisioning state of the managed certificate showed |
As for the incorrect order of certificates, is this Azure/azure-rest-api-specs#10637 what you see? |
I never used the Azure Key Vault Provider for Secrets Store CSI Driver when I used AKS thus cannot provide any concrete information on it. However, it could be the case because certificates in KeyVault used for Application Gateway and Azure CDN which are served in the correct order while these are not. Though, I would have thought that the certificate for the default domain is served using the same mechanisms as other certificates; but I just realized the root and intermediate certificates are different from the ones on the default domain. I wonder in which/whose KeyVault the managed certificate is stored (I thought it was a Kubernetes TLS Secret). |
Yes, this was fixed before we announced public preview. Please let us know if you're still having issues. |
This issue is a: (mark with an x)
Issue description
The managed certificates supported in the current/forthcoming preview do not include the intermediate "GeoTrust Global TLS" cert, which causes connections to domains secured by those certificates to fail from non-browser clients (e.g. curl, wget, and probably HTTP client libraries in various programming languages as well, depending on how they handle resolution of intermediate certificates, etc).
Per Qualsys' SSL Test, "This server's certificate chain is incomplete." Specifically, in its view of the certificate chain, it shows
GeoTrust Global TLS RSA4096 SHA256 2022 CA1
as requiring an extra download (which apparently browsers will do, but e.g. curl will not?). For reference, the cloudflare cert that we use for our ACA apps currently (with good results) carries all of its intermediate certificates.Presumably the fix here would be for ACA's managed certificates to form a complete chain from the root CA. The big question is whether that's slated to happen, or if this is as far as managed certificates are intended to go, and those looking for non-browser compatibility (for APIs and such) should plan on continuing to use other solutions.
Steps to reproduce
Expected behavior [What you expected to happen.]
Typical connection and a response from the service in question.
Actual behavior [What actually happened.]
An error message, and a terminated connection attempt. e.g. curl:
and wget:
The text was updated successfully, but these errors were encountered: