-
Notifications
You must be signed in to change notification settings - Fork 281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Meta] Security Plugin Bootstrapping Improvements #1630
Comments
[Proposal] Automatically sign / share certs with a trust on first use modeAfter start-up, autogenerate self-signed certificates are used for communication. Once the ClusterManager is selected, a certification changeout process occurs where the ClusterManager creates its own CA cert, it rotates its existing self-signed cert with a fresh cert signed from the CA cert. Then the nodes begin rotation process where they provide the with a new cert that the ClusterManager signs, and they replace their cert. This would require new APIs for certificate handoff related activities, but would also work in standard certification rotations. There also needs to be a way to make sure not just any node can insert itself into the signing related processes. |
[Proposal] Support certification authority such as ACM Private CA or Lets EncryptIn the configuration, add a way to identify the certificate management system, then add smaller for interaction with the various certificate authorities. Limitation of this process is that it requires all the nodes to be able to communicate with the external service, impact potential adoption. |
[Proposal] OpenSearch Clients handshake with OpenSearch for trusted communication channelWith an additional API that clients could attempts on first connect, establishes the trusted connection without resorting to system level CA cert installations. |
@setiah What do you think about some of these proposals? |
@setiah could you incorporate some of these ideas into the admin experience? |
I am not sure if I understood the proposal fully, but I am aligned with the overall idea of removing demo certs and replacing them with auto-generated self-signed certificates out of the box. There are technical challenges we might need to think through such as how does this work for multi-node cluster Could you please elaborate more on the approach and define |
From opensearch-project/OpenSearch#472 (comment) This cluster startup process came from Trust on First Use (TOFU) that is also compliable for clusters that are inside a secured network. Note: closing this issueI realize that I did not included any context when I I closed this issue; while this is desired to make improvements in this space we are not actively working on these improvements or proposals. We can certainly revive them in future efforts. |
Background
When installing the security plugin, there are features that need to be turned on in concert to work together. Many options require thoughtful values that need to be carefully copied while others are carefully modified. Hardcoded demo certifications have been used and while that resolves the coping configurations it creates an illusion of security. There should be an established security baseline.
Problem
How should an OpenSearch instance with security startup in a way that is secure when:
Related issues
Round up additional issues
The text was updated successfully, but these errors were encountered: