Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: check trustd API CA on worker nodes #4294

Merged
merged 1 commit into from
Sep 28, 2021

Conversation

smira
Copy link
Member

@smira smira commented Sep 27, 2021

This distributes API CA (just the certificate, not the key) to the
worker nodes on config generation, and if the CA cert is present on the
worker node, it verifies TLS connection to the trustd with the CA
certificate.

Signed-off-by: Andrey Smirnov [email protected]


This change is Reviewable

@smira smira added this to the v0.13 milestone Sep 27, 2021
@smira
Copy link
Member Author

smira commented Sep 27, 2021

/approve

@sergelogvinov
Copy link
Sponsor Contributor

After this PR, Talos machined can starts at boot time (as control-plane) with self-sign cert.
And it add possibilities to debug node, or call some unsecured functions.

@smira
Copy link
Member Author

smira commented Sep 27, 2021

After this PR, Talos machined can starts at boot time (as control-plane) with self-sign cert.
And it add possibilities to debug node, or call some unsecured functions.

not sure I follow that. it doesn't change the way control plane works

@sergelogvinov
Copy link
Sponsor Contributor

I meat, it can be a new PR.
It will solve many problems....

This distributes API CA (just the certificate, not the key) to the
worker nodes on config generation, and if the CA cert is present on the
worker node, it verifies TLS connection to the trustd with the CA
certificate.

Signed-off-by: Andrey Smirnov <[email protected]>
@smira
Copy link
Member Author

smira commented Sep 28, 2021

/m --ff

@talos-bot talos-bot merged commit 62acd62 into siderolabs:master Sep 28, 2021
smira added a commit to smira/talos that referenced this pull request May 23, 2024
Note: this issue never happens with default Talos worker configuration
(generated by Omni, `talosctl gen config` or CABPT).

Before change siderolabs#4294 3 years ago,
worker nodes connected to trustd in "insecure" mode (without validating
the trustd server certificate). The change kept backwards compatibility,
so it still allowed insecure mode on upgrades.

Now it's time to break this compatibility promise, and require
accepted CAs to be always present. Adds validation for machine
configuration, so if upgrade is attempeted, it would not validate the
machine config without accepted CAs.

Now lack of accepted CAs would lead to failure to connect to trustd.

Signed-off-by: Andrey Smirnov <[email protected]>
smira added a commit to smira/talos that referenced this pull request May 23, 2024
Note: this issue never happens with default Talos worker configuration
(generated by Omni, `talosctl gen config` or CABPT).

Before change siderolabs#4294 3 years ago,
worker nodes connected to trustd in "insecure" mode (without validating
the trustd server certificate). The change kept backwards compatibility,
so it still allowed insecure mode on upgrades.

Now it's time to break this compatibility promise, and require
accepted CAs to be always present. Adds validation for machine
configuration, so if upgrade is attempeted, it would not validate the
machine config without accepted CAs.

Now lack of accepted CAs would lead to failure to connect to trustd.

Signed-off-by: Andrey Smirnov <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants