Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Certificate hot-reloading #12753

Open
blaggacao opened this issue Aug 30, 2020 · 1 comment
Open

Certificate hot-reloading #12753

blaggacao opened this issue Aug 30, 2020 · 1 comment
Labels
inactive triaged: feature The issue/pr requests/adds a feature
Milestone

Comments

@blaggacao
Copy link

blaggacao commented Aug 30, 2020

I've spotted those threads on the topic:

SPIFFE — pars pro toto — are software solutions which implement extremely short lived certificates (on the time scale of 5 minutes expiry - by default).

It seems to be a trend in better securing workloads.

Therefore, I'd ask to implement a graceful hot-reload feature directly at the root of internet security leverage: here.

Zeyuan's approach atomically swapping the pointers seemed interesting, but was never heard of again?

Since we partly deal with long running processes downstream, besides of empowering short lived certificates practices, there is an argument to the amount of cache invalidation that are saved.

I haven't calculated the worlds consolidated saving in man hours (implementing "hacks" around cert reloading) and cache warm ups (compute time), but let's just say: it would be huge.

Can I have an official stance, or should I reverberate this back to the mailing list?


EDIT: I also posted a motion on the user mailing list. There is additional information there

@blaggacao blaggacao added the issue: feature request The issue was opened to request a feature label Aug 30, 2020
@mattcaswell mattcaswell added triaged: feature The issue/pr requests/adds a feature and removed issue: feature request The issue was opened to request a feature labels Sep 24, 2020
@t8m t8m added this to the Post 3.0.0 milestone Sep 24, 2021
@nhorman
Copy link
Contributor

nhorman commented Jun 12, 2024

It seems SSL_CTX_get_cert_store/X509_STORE_up_ref/SSL_CTX_set1_cert_store does what you want.

Marking as inactive, to be closed at the end of 3.4 dev, barring further input

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
inactive triaged: feature The issue/pr requests/adds a feature
Projects
None yet
Development

No branches or pull requests

4 participants