You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add support for client certificate validation to x509_cert input plugin
Current behavior:
For a certificate with only TLS Web Client Authentication key usage and no TLS Web Server Authentication, the plugin outputs verification=invalid and verification_error="x509: certificate specifies an incompatible key usage.
For the same certificate, with the following extensions, openssl verify outputs OK
Valid TLS Web Client Authentication certificates without TLS Web Server Authentication should be identified as valid.
Use case:
My Telegraf agents output to Kafka using TLS client certificates for authentication. I'd like to monitor the client certificates and alert when they near expiration. It works in the current version of Telegraf (1.14), but includes a message that they're invalid, when they are not.
For reference, these certificates were generated by CFSSL with the following usage
The more I think about it, the more it seems a bug, not a feature request. If it's a valid x509 certificate (and can be validated by openssl) then it shouldn't be reported as invalid by Telegraf.
Here are steps_to_reproduce.txt using cfssl (to generate certificates) and telegraf docker containers in Linux. Note that the issue also occurs in Telegraf for windows.
Feature Request (possibly Bug Report)
Add support for client certificate validation to x509_cert input plugin
Current behavior:
For a certificate with only
TLS Web Client Authentication
key usage and noTLS Web Server Authentication
, the plugin outputsverification=invalid
andverification_error="x509: certificate specifies an incompatible key usage
.For the same certificate, with the following extensions,
openssl verify
outputsOK
Desired behavior:
Valid
TLS Web Client Authentication
certificates withoutTLS Web Server Authentication
should be identified as valid.Use case:
My Telegraf agents output to Kafka using TLS client certificates for authentication. I'd like to monitor the client certificates and alert when they near expiration. It works in the current version of Telegraf (1.14), but includes a message that they're invalid, when they are not.
For reference, these certificates were generated by CFSSL with the following usage
The text was updated successfully, but these errors were encountered: