Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation and changes for verify_server_hostname #5069

Merged
merged 2 commits into from
Dec 6, 2018

Conversation

pearkes
Copy link
Contributor

@pearkes pearkes commented Dec 6, 2018

Since Consul 0.5.1, our documentation and parts of our implementation have stated that setting verify_server_hostname to true would implicitly configure verify_outgoing to true. A bug in this implementation resulted in this being partially incorrect and resulting in plaintext communication in agent-to-agent RPC.

All affected users can add the verify_outgoing key (set to true) to their configuration and restart all Consul agents - both client and server. We recommend checking the validity of the TLS certificates since the issue may have been masking expired or invalid certificates, as they were not being used.

This corrects the documentation we will make live now, as well as the fix that will go into Consul 1.4.1.

Note that this is assigned CVE-2018-19653 and we will be posting separately on the Consul mailing list to notify users with more detailed instructions and information.

Mailing List Announcement Post

@pearkes pearkes added this to the 1.4.1 milestone Dec 6, 2018
@pearkes pearkes requested a review from a team December 6, 2018 21:38
@pearkes pearkes merged commit b64e8b2 into master Dec 6, 2018
@pearkes pearkes deleted the verify_server_hostname_fix branch December 6, 2018 21:51
pearkes added a commit that referenced this pull request Dec 6, 2018
* verify_server_hostname implies verify_outgoing

* mention CVE in the docs.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants