-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
proxy: Make inbound servers aware of client identities #2126
Labels
Comments
In order to provide this, we want to grab a verified SAN from the client certificate. As of today, there's two ways we could do this, but both will require additional work outside the proxy:
|
PR for webpki filed: briansmith/webpki#91 |
olix0r
pushed a commit
to linkerd/linkerd2-proxy
that referenced
this issue
Feb 7, 2019
If meshed TLS is used on an inbound connection, the TLS Identity of client is added as a header `l5d-client-id` to the request, so that the internal service can see it was encrypted. * Client certificates were already automatically used if a proxy was configured with TLS. * The server verifier was changed to _require_ a client certificates. * We assume the first DNS name in the certificate is the TLS identity assigned by the controller's CA. * In order to get the DNS names from the certificate, a fork of webpki is used, while waiting for the pull request to land. * The `l5d-client-id` header is stripped on both inbound and outbound requests at the beginning, so _only_ the inbound proxy will expose this header. Closes linkerd/linkerd2#2125 linkerd/linkerd2#2126 Signed-off-by: Sean McArthur <[email protected]> Co-Authored-By: seanmonstar <[email protected]>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Once #2125 is complete:
l5d-client-id
header should be added (similar tol5d-server-id
)The text was updated successfully, but these errors were encountered: