-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFI: ca_cert_file #506
Comments
Oh also:
|
Here are the messages when I pass -msg to openssl (with all the bytes removed):
|
It looks like neither the client nor the server can verify the issuer up to the root authority. |
When I tracked down and added the very very root CA to the CAFile it seems to be working working a little bit better from the client's perspective. I'm assuming if I mirror the same thing on the server side it will get better. |
Just to add more color here. openssl needs to be able to trace back to a self-signed rooted certificate. I did not have those in my pem file. NSS (curl) and java are less finicky about it. |
envoyproxy#506) * update docs/root/configuration/http/http_filters/grpc_stats_filter.rst * update
Description: this PR wires up on trailers callback for android, which was previously missing. Risk Level: low - using already battled tested code paths for accumulating headers. Testing: pending testing with gRPC on the Lyft android app Fixes #506 Signed-off-by: Jose Nino <[email protected]> Signed-off-by: JP Simard <[email protected]>
Description: this PR wires up on trailers callback for android, which was previously missing. Risk Level: low - using already battled tested code paths for accumulating headers. Testing: pending testing with gRPC on the Lyft android app Fixes #506 Signed-off-by: Jose Nino <[email protected]> Signed-off-by: JP Simard <[email protected]>
Hi,
I've got envoy setup in a kubernetes cluster and I was looking to add Mutual Auth TLS to an ingress listener. Box has an interesting TLS setup where the files we typically get provided are:
So on the ingress listener I've added:
Now if I comment out the ca_cert_file line I am able to curl the endpoint and get a response.
If I leave the line in I'm unable to establish a TLS connection. Please note in all of the below. I've got the ca file setup to trust the service itself and I'm connecting to the service with its own cert, own key, and the ca file which trusts itself.
We've used this type of cert setup for a number of different programs and not had an issue before. I'm curious if there's something special needed for envoy.
Note the curl command line I used was (it successfully verifies the cert with it's cacert file):
If I
openssl x509 -in serviceName.crt -text -noout
, here are some snippets:If I do the same on the serviceName.pem:
If I connect using
openssl s_client -CAfile serviceName.pem -key serviceName.pem -cert serviceName.crt -showcerts -connect localhost:11000
:Also:
The text was updated successfully, but these errors were encountered: