-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[docs/security] describe how to extract ca, cert & key from p12 truststore in Kibana docs #26414
Comments
Pinging @elastic/kibana-security |
There are some caveats with this approach too unfortunately. We have noticed that
So in summary the above commands work with the
|
Quick note: I think the default pk12 filename (if docs are followed) is actually |
Thanks @nerophon for documenting this. I used your steps above, but then needed to sort out which files to use for each setting. It might not be perfect since my kibana is on the same VM as elasticsearch. Below is what worked for me:
|
I describe a similar method in the following blog: https://www.elastic.co/blog/elasticsearch-security-configure-tls-ssl-pki-authentication Private Key Public Certificate CA Certificate |
@alexander-marquardt any specific reason for stripping out the PEM headers/footers ? A number of implementations ( including our own ) depend on reading the header when trying to parse keys and certificates from files. See also RFC-7468 |
@jkakavas - That is the way that I found that worked, after experimenting and trying to figure out how to do this. This worked when the blog was written, and I believe it should still work. I can't remember details of why I did that. If there is a better way, then we should update the blog with it |
@jkakavas - I have verified that this works correctly with the PEM headers/footers left in the certificates. I have also verified that the way that I previously documented also works correctly. However, I will update the blog to use the following. Private Key |
Just to be clear - The previous format ( without the headers ) would work fine for curl commands and probably in Kibana too. However if these PEM files when then used by some other client ,or the user used relevant Thanks for taking care of this @alexander-marquardt |
@nerophon can we close this? |
@KOTungseth I think this is an addition that is worthwhile to kibana docs in the end of 2.b in https://www.elastic.co/guide/en/kibana/7.3/configuring-tls.html . In a "If you used |
Starting in 7.6, Kibana will support PCKS #12 certificates, so this documentation will only be requires for <= 7.5 Kibana |
Closed by #54981 |
Currently, the Elasticsearch docs describe a convenient way to generate a truststore containing all needed files to enable SSL. However Kibana does not support truststores for this purpose, so it would be appropriate for the Kibana SSL docs to describe how to extract the needed files from a .p12 truststore which likely was created for ES nodes.
The commands are as follows:
openssl pkcs12 -in elasticsearch-certificates.p12 -cacerts -nokeys -out ca.crt
openssl pkcs12 -in elasticsearch-certificates.p12 -clcerts -nokeys -out node.crt
openssl pkcs12 -in elasticsearch-certificates.p12 -nocerts -out node.pem
These assume the default name is used for the truststore.
The text was updated successfully, but these errors were encountered: