-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
can you expand the docs for K3S_TOKEN security #6175
Comments
This is a reasonable ask, but the short answer is that the token can be in one of two formats:
|
Thank you! When connecting with K10 format, is the sequence:
(I.e. does validation happen before the user/password are transmitted) |
Everything uses TLS.
Step 2 is omitted if the hash is not included in the token; any cluster CA sent by the remote node is accepted. If you want to validate the identity of the cluster you're joining, you should always use the K10 format. |
Thanks, that makes total sense |
Does this mean that when I install the first server with the |
Yes, you can absolutely use that short token format on all your nodes. You'll be missing the CA validation that comes from including the K10 prefix, but that cannot be known ahead of time as the CA certs are generated during initial server startup. |
Is your feature request related to a problem? Please describe.
It's not clear from the k3s docs whether
K3S_TOKEN
(recommended here) is a two-way validation. I.e., is it just a way for the new agent to authenticate to the cluster? Or does it also allow the new agent to validate that the server is who it appears to be?Describe the solution you'd like
Can you please add a line in the docs saying if:
Describe alternatives you've considered
(digging through code and old issues)
Additional context
The text was updated successfully, but these errors were encountered: