-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS client is build with InsecureSkipVerify #1263
Comments
https://github.com/kedacore/keda/pull/1251/files makes some progress towards this. creation of HTTP requests is limited to 1-2 points in the code |
Is this just for RabbitMQ @aman-bansal? |
No it's something that has been present at every place where we work with TLS. RabbitMQ, Kafka, Metric api everywhere. |
We could help support it for Redis TLS too |
#1251 (comment) for related discussion on this |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
It seems that this issue should stay open. Our TLS clients should, by default, not be built with |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
This issue has been automatically closed due to inactivity. |
looks like rabbitmq doesn't support it yet until now |
InsecureSkipVerify
while defined TLS client is not recommended in production systems. This is susceptible to man in the middle attack. Only for internal testing, this should be enabled.Expected Behavior
One of the hidden features of TLS is hostname verification. While defining client,
ServerName
verification is needed to detect if there is any routing via man in the middle attack. For this to work, the client should know which server he is expecting the results. It works automatically if the hostname is matched to the server name provided in the certificate. Otherwise, we need to specify it separately.Actual Behavior
InsecureSkipVerify is being used and thus hostname verification is skipped.
Specifications
Present in all versions
Solution / Suggestion
I believe for every scaler using TLS server name should be added as an additional trigger parameter. If not provided, we will use InsecureSkipVerify.
Let's discuss how best we can achieve this. And I would love to pick this up too.
cc. @ahmelsayed @zroubalik @tomkerkhove @turbaszek
The text was updated successfully, but these errors were encountered: