-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SNI is getting dropped when routing Cross Cluster TCP with tls passthrough between Edge and service clusters #2517
Comments
The issue here is that requests are getting routed to On the HTTP-side, we have a I think the SNI dynamic forward proxy might work (https://www.envoyproxy.io/docs/envoy/latest/configuration/listeners/network_filters/sni_dynamic_forward_proxy_filter) (envoyproxy/envoy#10448), but it's in Envoy v1.15 and also needs the v3 xDS API. |
Can you show me where this is happening in he config above? |
…roxy Sets the SNI on any TCPProxy.Service which references an externalName type service as well as having the upstream protocol of "tls". Updates projectcontour#2517 Signed-off-by: Steve Sloka <[email protected]>
…roxy Sets the SNI on any TCPProxy.Service which references an externalName type service as well as having the upstream protocol of "tls". Updates projectcontour#2517 Signed-off-by: Steve Sloka <[email protected]>
…roxy Sets the SNI on any TCPProxy.Service which references an externalName type service as well as having the upstream protocol of "tls". Updates projectcontour#2517 Signed-off-by: Steve Sloka <[email protected]>
…roxy (#3291) Sets the SNI on any TCPProxy.Service which references an externalName type service as well as having the upstream protocol of "tls". Updates #2517 Signed-off-by: Steve Sloka <[email protected]>
…roxy (projectcontour#3291) Sets the SNI on any TCPProxy.Service which references an externalName type service as well as having the upstream protocol of "tls". Updates projectcontour#2517 Signed-off-by: Steve Sloka <[email protected]> Signed-off-by: iyacontrol <[email protected]>
Closing due to lack of response. Feel free to reopen if this is still an issue |
We are trying out a cross cluster Contour deployment with one deployment at the Edge and one Contour deployment per client cluster.
This deployment works as expected for most use cases for http/https as long as we have Host header rewritten in the httpproxy of the Edge eg:.
requestHeadersPolicy:
set:
- name: Host
value: echocluster.vdp-dev.vmware.com
However, routing on TCP with tls passthrough gets a SSL_ERROR_SYSCALL for curl request on the TCP fqdn.
Eg: curl -v https://tcpecho.vdp-dev.vmware.com/health.
I think the issue can be solved if there is a way to inject SNI equivalent to the requestHeadersPolicy in http . Wondering if anyone has faced and solved this use case before?
Service and HTTPproxy config details:
Edge cluster GW to Tenanat cluster GW
HTTPProxy :
Tenant Cluster GW to upstream service
HTTPProxy
The text was updated successfully, but these errors were encountered: