Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Validate component certs by default #954

Open
ctlong opened this issue Feb 15, 2022 · 2 comments
Open

Validate component certs by default #954

ctlong opened this issue Feb 15, 2022 · 2 comments

Comments

@ctlong
Copy link
Member

ctlong commented Feb 15, 2022

What is this issue about?

cf-deployment currently skips verification of certificates for certain inter-component communications by default, with an ops file to stop skipping certificate validation.

We would expect the reverse, that cf-deployment be the most secure by default, with an ops file to make it insecure as desired.

What version of cf-deployment are you using?

cf-deployment v17.1.0

Please include the bosh deploy... command, including all the operations files (plus any experimental operation files you're using):

N/A

Please provide output that helps describe the issue:

N/A

What IaaS is this issue occurring on?

N/A

Is there anything else unique or special about your setup?

N/A

Tag your pair, your PM, and/or team!

@mkocher @acrmp

@ctlong
Copy link
Member Author

ctlong commented Feb 15, 2022

We tried to resolve this in #952. However, the CF-D pipeline environments use self-signed certs, which prevented tests from passing. Therefore, created we were forced to revert that PR, and have created this issue to track future work.

Tim Downey also noted that many of the present cert validation skips are in place due to a long-standing issue with validating certs for space-scoped service brokers in CC_NG.

@ctlong ctlong moved this from Inbox to Waiting on feedback in App Runtime Deployments Working Group Mar 9, 2023
jochenehret added a commit that referenced this issue Jan 16, 2025
* this environment uses relint_ca as root CA
* see also #954
@jochenehret
Copy link
Contributor

Current status: "cedric", "bbr" and "cats" environments still use self-signed load balancer certificates. The other test environments use the relint_ca root certificate and have TLS enabled.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Waiting on feedback
Development

No branches or pull requests

2 participants