-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request]: Have tls server name (sni) set for outbound https connections #207
Comments
Thank you for submitting the feature request to AWS Private CA Issue plugin. We will review the request and get back to you. |
We would like to have some further clarification. Is this referring to the requests from the plugin -> acm-pca? |
This is for outgoing https requests from the aws-acm-pca-aws-privateca-issuer pod to external endpoints. Currently Istio just sees outbound tcp connections on port 443 but since tls server name / sni is not set Istio can't tell what hostname the connection is for. |
Thank you for the clarification. We will review the information and get back to you. |
Hi @ceastman-r7 . We have placed this change in our priority queue, thank you for the suggestion. |
Describe why this change is needed
In an Istio enabled environment when egress filtering is enabled, Istio uses the hostname / sni to do egress hostname matching.
If there is no tls server name / sni then Istio can't match the oubound tcp port 443 connection so it would block it.
Describe solutions and alternatives considered (optional)
Istio sidecar resource can allow all but that defeats the purpose of having Istio perform egress filtering.
Is there anything else you would like to add?
No response
The text was updated successfully, but these errors were encountered: