Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Istio-Gateway should support two certificates for the same domain (RSA & EC) #38946

Closed
Crazyigor1987 opened this issue May 16, 2022 · 4 comments
Assignees
Labels
area/networking area/security kind/enhancement lifecycle/automatically-closed Indicates a PR or issue that has been closed automatically. lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while

Comments

@Crazyigor1987
Copy link

Describe the feature request
We have a requirement to run two certificates on our cloud environment with the same hostnames. One RSA and the other with the modern Eliptic Curve procedures. The Istio ingress gateway should be able to load both certificates and decide through the client request which encryption method to use.

Describe alternatives you've considered
I have seen alternatives at Envoy in the form of DownStreamTLSContext. As described here. However, it would be desirable to control this via the gateway.

Affected product area (please put an X in all that apply)

[ ] Docs
[ ] Installation
[X] Networking
[ ] Performance and Scalability
[ ] Extensions and Telemetry
[X] Security
[ ] Test and Release
[ ] User Experience
[ ] Developer Infrastructure

Affected features (please put an X in all that apply)

[ ] Multi Cluster
[ ] Virtual Machine
[ ] Multi Control Plane

Additional context

@shankgan
Copy link
Contributor

Does envoy support discovery of multiple TLS certificates for the downstream TLS context via SDS - https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/core/v3/base.proto#envoy-v3-api-msg-config-core-v3-datasource? Would be good to enumerate the advantages and reasons for this in an RFC in the team drive - https://groups.google.com/g/istio-team-drive-access, particularly since this requires some Istio SDS API refactoring to support it.

@dragondam
Copy link

@Crazyigor1987 Do you have any solution for that?

@istio-policy-bot istio-policy-bot added the lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while label Jan 21, 2023
@Crazyigor1987
Copy link
Author

@dragondam
Nope. We agreed with our customer to use RSA Certificates for now. Sure hope that one day istio will support it.

@istio-policy-bot
Copy link

🚧 This issue or pull request has been closed due to not having had activity from an Istio team member since 2022-07-25. If you feel this issue or pull request deserves attention, please reopen the issue. Please see this wiki page for more information. Thank you for your contributions.

Created by the issue and PR lifecycle manager.

@istio-policy-bot istio-policy-bot added the lifecycle/automatically-closed Indicates a PR or issue that has been closed automatically. label Feb 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/networking area/security kind/enhancement lifecycle/automatically-closed Indicates a PR or issue that has been closed automatically. lifecycle/stale Indicates a PR or issue hasn't been manipulated by an Istio team member for a while
Projects
None yet
Development

No branches or pull requests

4 participants