Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mTLS support #730

Open
adri opened this issue Nov 22, 2024 · 0 comments
Open

mTLS support #730

adri opened this issue Nov 22, 2024 · 0 comments

Comments

@adri
Copy link
Contributor

adri commented Nov 22, 2024

AWS added mTLS support to ALBs earlier this year. We could not find support for mTLS in this project.

Our goal is to use mTLS for most of the (sub) domains for a Kubernetes cluster to reduce the attack surface. We're evaluating if we can implement the following ALB listener structure:

  • exception: host matches webhook.* disable mTLS and forward to Kubernetes
  • default: enable mTLS and forward to Kubernetes
SCR-20241122-odmg

Questions:

  • How to implement the "exception" listener? Would this be a another listener or should we define a different ingress-class which would create a second ALB?
  • Would you accept a PR to implement this (if we chose to continue with)?

Ideas:

New flags

  • aws-mtls-mode = off|verify|passthrough
  • aws-mtls-trust-store-arn = ... ARN of the elbv2 Trust Store
  • aws-mtls-ignore-client-certificate-expiry = true|false
  • ignore_client_certificate_expiry

New annotation:

  • zalando.org/aws-mtls-mode = off|verify|passthrough on each ingress to turn off mTLS on a specific domain
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant