Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Deprecation] Removal of insecure options: --insecure-listen-addresss and unset --tls-cert-file, --tls-private-key-file #187

Closed
ibihim opened this issue Aug 8, 2022 · 1 comment

Comments

@ibihim
Copy link
Collaborator

ibihim commented Aug 8, 2022

What

We are removing the option to run kube-rbac-proxy without configured TLS certificates.
This means that:

  • using insecure-listen-addresss won't work any more.
  • not setting tls-cert-file and tls-private-key-file won't work any more.

Upstream H2C should still work, but we might remove verified claims about an identity that are send to upstream in the future.

Why

We are aware that we create obstacles in running kube-rbac-proxy for testing or debugging purposes.
But we reduce the probability for an insecure set up of kube-rbac-proxy, which is a security relevant component.

Running kube-rbac-proxy without TLS certificates, makes it possible to impersonate kube-rbac-proxy.

The reason that we remove that capability is a pre-acceptance requirement for kube-rbac-proxy, before we can donate the project so sig-auth of k8s.

Reference

@ibihim ibihim changed the title Removal of insecure options [Deprecation] Removal of insecure options: --insecure-listen-addresss and unset --tls-cert-file, --tls-private-key-file Aug 8, 2022
@ibihim
Copy link
Collaborator Author

ibihim commented Nov 28, 2022

Gathering deprecation in this issue: #196

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant