Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request for TLS 1.2 #979

Closed
neolunar7 opened this issue Mar 5, 2021 · 3 comments
Closed

Request for TLS 1.2 #979

neolunar7 opened this issue Mar 5, 2021 · 3 comments
Assignees

Comments

@neolunar7
Copy link

neolunar7 commented Mar 5, 2021

Is your feature request related to a problem? Please describe.
According to the link https://www.boundaryproject.io/docs/concepts/security/connections-tls, there seems to be only support for TLS 1.3. However, when using AWS ALB as a load balancer in front of Boundary, TLS related error arises. I posted the issue on https://discuss.hashicorp.com/t/boundary-connect-ssh-throwing-failed-to-websocket-dial-error/21609. I can resolve this issue by changing the ClusterIP service type to NodePort service type, bypassing the LoadBalancer and directly accessing the pod.

Describe the solution you'd like
Boundary TLS only supports 1.3, but this is not consistent with the cloud provider settings. (I use AWS, and don't know about other providers) If we can select between TLS 1.2 and 1.3, it would be really helpful.

Describe alternatives you've considered
None

Explain any additional use-cases
None

Additional context
None

@malnick malnick self-assigned this Mar 17, 2021
@malnick malnick added the enhancement New feature or request label Mar 17, 2021
@malnick
Copy link
Collaborator

malnick commented Mar 17, 2021

Thanks for posting this @neolunar7 and sorry for the tardy response. This sounds like a good request, and I'll work on getting it added to our road map. It does look like AWS released support for 1.3 in CloudFront, but looking at ELB's it appears they're still only on 1.2 as you noted.

@jefferai
Copy link
Member

We don't support TLS protocol decoding between the client and proxy. (We may in the future to allow you to use your own client certs, but don't now.) We use a tightly-controlled ephemeral TLS stack for every proxy connection; see https://www.boundaryproject.io/docs/concepts/security/connections-tls#client-to-worker-tls

Even if we allowed TLS 1.2, you wouldn't be able to use it with ALB because you wouldn't have any way to get the CA cert or server cert generated just for that single session.

@jefferai jefferai added needs-response and removed enhancement New feature or request labels Mar 17, 2021
@jefferai
Copy link
Member

Closing due to lack of response.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants