kubeadm icon indicating copy to clipboard operation
kubeadm copied to clipboard

Creating separate CAs for client and server certificates

Open chrisnegus opened this issue 4 years ago • 8 comments

edit: neolit123

This is a Feature Request

A suggestion was made by @deads2k in PR26837 to update kubeadm docs to suggest separating client and server CAs:

If I were choosing one thing to tweak about kubeadm's certificate generation overall, I would suggest splitting the CA that signs serving certificates from the CA that signs client certificates. Since we lack individual certificate revocation and the few servers are less likely to expose their cert/key pairs than the many clients, separating the two allows for less disruption if a CA needs to stop being trusted.

What would you like to be added

Add two separate CAs for signing server and client certificates in kubeadm deployments.

Update documentation describing suggesting that separate CAs be used. The information could go on the PKI certificates and requirements page), but it could also go on other kubeadm initialization docs.

Why is this needed This practice could result in less disruption of only one of the two CAs needs to stop being trusted.

chrisnegus avatar Oct 07 '21 19:10 chrisnegus

@chrisnegus: This issue is currently awaiting triage.

SIG Docs takes a lead on issue triage for this website, but any Kubernetes member can accept issues by applying the triage/accepted label.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Oct 07 '21 19:10 k8s-ci-robot

hi, you can close this issue and log the same issue in kubernetes/kubeadm for tracking. it's not something that is easy to implement, is a breaking change and would require a KEP https://github.com/kubernetes/enhancements/tree/master/keps

neolit123 avatar Oct 07 '21 20:10 neolit123

/transfer kubeadm

Is that OK?

sftim avatar Oct 07 '21 22:10 sftim

/retitle Creating separate CAs for client and server certificates

@chrisnegus would you be willing to tweak this issue now it's logged against kubeadm? The description is now slightly out (through no fault of your own).

sftim avatar Oct 07 '21 22:10 sftim

/kind feature

sftim avatar Oct 07 '21 22:10 sftim

thanks for transferring the issue @sftim i can tweak the description.

we can keep this tracked here, but i also wanted to note that i have hopes that certificate revocation will be supported one day, which is a much desired feature in general.

neolit123 avatar Oct 07 '21 22:10 neolit123

@neolit123 @sftim Thanks for following up with this. I would be happy to help if some writing assistance is needed with this.

chrisnegus avatar Oct 11 '21 17:10 chrisnegus

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

k8s-triage-robot avatar Jan 09 '22 17:01 k8s-triage-robot