-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS keys containing other pem blocks proceeding the private key are considered invalid #1702
Comments
I already have a patch, just working on a test :) |
Does Envoy accept and use the additional PEM objects? |
Walk each PEM block to identify the PRIVATE KEY closes projectcontour#1702
@jpeach The certificates I've been using with contour versions v0.5.0 to v0.14.2 have contained Technically, there is a similar flaw with the certificate handling (to less detriment). Currently, a secret will be accepted if the first cert in the PEM block is valid |
Walk each PEM block to identify the PRIVATE KEY closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
Walk each PEM block to identify the PRIVATE KEY closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
Walk each PEM block to identify the PRIVATE KEY closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
@youngnick I think #1707 makes more sense than #1704 (i was trying to keep this very small hoping for a back port .. but the other addresses both the cert and the private key). |
If 0.15.1 broke certificates which envoy previously accepted the we should backport it to 0.15.2 regardless of the cost.
… On 16 Oct 2019, at 11:03, Matthew Alberts ***@***.***> wrote:
@youngnick I think #1707 makes more sense than #1704 (i was trying to keep this very small hoping for a back port .. but the other addresses both the cert and the private key).
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
@mattalberts I agree, I'm going to check out #1707 properly now and, assuming it's all good (which a cursory inspection suggests), then I'll close out #1704. |
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes projectcontour#1702 Signed-off-by: Matt Alberts <[email protected]>
During certificate validation, walk the PEM and validate each appropriate block. closes #1702 Signed-off-by: Matt Alberts <[email protected]>
What steps did you take and what happened:
Created a secret whose
EC PRIVATE KEY
containsEC PARAMETERS
. The functionvalidatePrivateKey
locates theEC PARAMETERS
pem.Block, attempts to validate it as a private key, and rejects the secret as valid.What did you expect to happen:
I expected the secret to be accepted as valid :)
Anything else you would like to add:
The private key pem struct is something like this
I did scan, but didn't find a similar issue.
Environment:
kubectl version
): N/A/etc/os-release
): N/AThe text was updated successfully, but these errors were encountered: