-
Notifications
You must be signed in to change notification settings - Fork 338
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
External Service easily misconfigured in an insecure way #4758
Comments
Alternatively, it could configure a default bundle of public CAs. |
|
Though that would still make the default setup insecure by default no? |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
This issue was inactive for 90 days. It will be reviewed in the next triage meeting and might be closed. |
@slonka do we agree that's no longer the case with MeshExternalService? |
|
Description
The below External Service policy is valid despite the fact that
networking.tls.caCert
is not set. When this is not set Envoy does not have a trusted_ca configured for the upstream TLS. In this situation Envoy does not verify server certificates so communication to the external service is not secure.Many people might assume that by default a system CA bundle will be used to verify server certificates seeing as this is not a mandatory field.
If TLS is enabled for an External Service then caCert should be mandatory to avoid insecure misconfiguration.
ref: https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/transport_sockets/tls/v3/tls.proto#extensions-transport-sockets-tls-v3-upstreamtlscontext
The text was updated successfully, but these errors were encountered: