Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request]: Have tls server name (sni) set for outbound https connections #207

Open
ceastman-r7 opened this issue Jun 27, 2022 · 6 comments
Labels
enhancement New feature or request

Comments

@ceastman-r7
Copy link

Describe why this change is needed

In an Istio enabled environment when egress filtering is enabled, Istio uses the hostname / sni to do egress hostname matching.

If there is no tls server name / sni then Istio can't match the oubound tcp port 443 connection so it would block it.

Describe solutions and alternatives considered (optional)

Istio sidecar resource can allow all but that defeats the purpose of having Istio perform egress filtering.

Is there anything else you would like to add?

No response

@ceastman-r7 ceastman-r7 added the enhancement New feature or request label Jun 27, 2022
@varunvallabhan52
Copy link

Thank you for submitting the feature request to AWS Private CA Issue plugin. We will review the request and get back to you.

@varunvallabhan52
Copy link

We would like to have some further clarification. Is this referring to the requests from the plugin -> acm-pca?

@ceastman-r7
Copy link
Author

This is for outgoing https requests from the aws-acm-pca-aws-privateca-issuer pod to external endpoints. Currently Istio just sees outbound tcp connections on port 443 but since tls server name / sni is not set Istio can't tell what hostname the connection is for.

@ceastman-r7
Copy link
Author

For instance:
Screen Shot 2022-06-27 at 4 48 43 PM

@varunvallabhan52
Copy link

Thank you for the clarification. We will review the information and get back to you.

@divyansh-gupta
Copy link
Contributor

divyansh-gupta commented Jul 5, 2022

Hi @ceastman-r7 . We have placed this change in our priority queue, thank you for the suggestion.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants