-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Agent] Enforce TLS connection for enrolling or checking in. #16736
Comments
Pinging @elastic/ingest (Project:fleet) |
are we verifying cert in any way? like we have process defined elsewhere comparing cert hash? or will we rely on standard ways |
@michalpristas We actually rely on the standard way, the ca_sha256 pins check when provided is done as a callback after the chain was created. What we want to do is without the -insecure flag set we refuse to connect to the remote host if TLS is not used. I think it will be used in two scenario:
This is why when the -insecure flag is used we want to be noisy in the terminal to inform them about the risk. I believe on the Kibana side they wanted to add a banner to warn if fleet was enabled without TLS. |
Pinging @elastic/ingest-management (Team:ingest-management) |
@blakerouse could you take a look at this to unblock our integration tests? |
@blakerouse Could you take a look? |
@ph looking into it |
Currently, it's possible to enroll the Agent without using a TLS connection, you only need to use the "HTTP" protocol when enrolling. Since the Agent can be effectively controlled by a remote kibana instance we want to enforce the requirement of TLS and refuse to enroll if the Kibana endpoint doesn't have TLS enabled.
It should fail when using the following to enroll
You can disable the TLS requirement by using the
-insecure
, using this flag should warn the user that the connection is insecure and this flag should not be used in production.The text was updated successfully, but these errors were encountered: