-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New CS proposal: Cross-organization mTLS #1492
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@MarkSRobinson - I think this is a great idea, especially if you are willing to do the heavy lifting and create a PR. If you do that, I will volunteer to be one of the reviewers and if he doesn't mind, I'd like to volunteer @markgamache as the 2nd reviewer. |
Agree with @kwwall this is a good idea. @MarkSRobinson do you want to create initial PR? |
Yup, I'll get started on it. |
I can't wait to see this. Given that this is pretty complex and there are a ton of tradeoffs, if you want to start with a more celebrative (g-doc or such) doc type, before a PR, that might be good. |
@MarkSRobinson anu updates on this |
@mackowski I've got an early draft, but it's slow going. The good news is the CAB plan to drop cert lifetimes to 47 days will definitely push this up the priority queue. |
My take on mTLS is that implementing mutual TLS is brutally complicated when you're doing it manually, operationally. By using a service mesh like istio makes it radically easier to do. Just my 2 cents. |
What is the proposed Cheat Sheet about?
There is currently zero standards around how organizations can setup mTLS between them. In the absence of any recommendations, people will just make up whatever rules appeal to them. These rules basically make zero sense if you understand TLS at any level, but on the plus side they also carry the risk of hard downtime if a mistake is made or if someone is on vacation.
What security issues are commonly encountered related to this area?
What is the objective of the Cheat Sheet?
Fundamentally, I want a standard I can point to such that it mitigates the following risks:
What other resources exist in this area?
The quality of documents around mTLS is shockingly poor. Most tutorials on the subject recommend hard-coding credentials.
Other documents are basically sales pitches for low-quality vendor solutions which work only inside a walled garden.
The text was updated successfully, but these errors were encountered: