Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Allow to disable SSL/TLS communication #2414

Closed
reta opened this issue Jan 23, 2023 · 6 comments
Closed

[FEATURE] Allow to disable SSL/TLS communication #2414

reta opened this issue Jan 23, 2023 · 6 comments
Assignees
Labels
enhancement New feature or request triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable.

Comments

@reta
Copy link
Collaborator

reta commented Jan 23, 2023

Is your feature request related to a problem?
The security plugins comes with SSL/TLS communication out of the box. This certainly should be the default, but in certain environments which use other means of secure communication (for example, IPSec), it would be great to offer the option to disable SSL/TLS.

What solution would you like?
Offer the option to disable SSL/TLS.

What alternatives have you considered?
N/A

Do you have any additional context?
It might not be easy to do but preliminary discussion hinted it is feasible, in general.

@reta reta added enhancement New feature or request untriaged Require the attention of the repository maintainers and may need to be prioritized labels Jan 23, 2023
@cwperks
Copy link
Member

cwperks commented Jan 23, 2023

[Triage] @peternied Could you please provide some context around the limitations of the securityadmin tool relying on TLS/SSL?

@cwperks cwperks added triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable. and removed untriaged Require the attention of the repository maintainers and may need to be prioritized labels Jan 23, 2023
@reta
Copy link
Collaborator Author

reta commented Jan 23, 2023

Could be unblocked by #2411

@peternied
Copy link
Member

There is a functional concern that the security plugin depends on the admin certificate to authenticate a super admin user, without support for this there are many scenarios that are not possible. If the certificate was removed as a requirement for these APIs then this could be opened up.

Related issues

@JaneJeon
Copy link

+1 for sure. To basically echo the sentiments of the original thread, #37, if you're already running all nodes and connections within a VPC, the SSL is redundant.

@peternied
Copy link
Member

@reta With #2411 [1] merged, I think a large part of this issue is resolved - I am closing. If there are there other features that are not accessible, could you file issues on them or reopen with more details?

@cwperks
Copy link
Member

cwperks commented Aug 9, 2023

@peternied From what I understand, the original intent of this request is to disable Transport level TLS (instead of REST-level TLS which the security plugin already supports disabling)

At one point it looks like this feature may have been under development (See #37 (comment)), but I'm not sure of the status of that.

The major concern pointed out here is that disabling Transport TLS has consequences for the logic around nodes joining the cluster securely. A major feature of the security plugin is either the static nodes_dn setting in opensearch.yml or the dynamic nodes_dn.yml file which is part of the security index. In order for a node to join the cluster securely it must present a certificate that matches a known node_dn.

There is a concept of "Dual Mode" which may help:

Dual mode feature will allow each node to communicate either in TLS or in plain-text based on the other node's response. (so moving from TLS disable to enable will become simple without any down time. )

PR where it was introduced: #712

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request triaged Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
Projects
None yet
Development

No branches or pull requests

4 participants