-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: ssl-client-cert header optional when using client cert authentication #1714
Comments
I am experiencing the same issue. When enabling the Output of nginx-ingress-controller with --v=5:
Verbose error log of Apache
When I remove the |
I had the same issue. Looks more like a bug introduced in #1572 when Is there a reason why |
@rikatz ping |
So, the behaviour between Apache and NGINX are different. According to NGINX Doc, the previously used variable (ssl_client_cert) is going to be deprecated, and they have replaced that to ssl_client_escaped_cert and ssl_client_raw_cert. ssl_client_raw_cert doesn't work as a valid header for none of the tested environments here (made some tests with python and golang), while ssl_client_escaped_cert replaces some 'invalid' characters with URL Encoded characters (like %20 instead of spaces). The thing here is that, any of the changes is going to cause impacts in working applications. The right way now is to return to ssl_client_escaped_cert (as the currently configuration is not working anyway), but we need to figure out with NGINX if ssl_client_cert is really going to be deprecated, and if there's going to be another alternative to this. The ticket that changed this in NGINX code was this: http://hg.nginx.org/nginx/rev/82f0b8dcca27 My opinion is that we should have kept ssl_client_cert in nginx until they announce the final deprecation of this variable, and then replace to nginx_client_escaped_cert, but as this has been made yet, I'm going to open a PR this afternoon to revert nginx.tmpl to use nginx_client_escaped_cert. |
Thanks |
Is this a request for help? (If yes, you should use our troubleshooting guide and community support channels, see https://kubernetes.io/docs/tasks/debug-application-cluster/troubleshooting/.):
What keywords did you search in NGINX Ingress controller issues before filing this one? (If you have found any duplicates, you should instead reply there.):
Is this a BUG REPORT or FEATURE REQUEST? FEATURE REQUEST:
NGINX Ingress controller version:
0.9.0-beta.17
Kubernetes version (use
kubectl version
):1.7.10
Environment:
not relevant
What happened:
When using TLS client cert auth several headers are added.
One of these headers is: ssl-client-cert which contains $ssl_client_raw_cert.
Our application seems not being able to cope with the multiline cert header (I think, or header size or something). When the header is not send is works fine.
So I would like the option of not sending the raw cert header when using client cert auth.
Now the DN is also sent it is not always needed to send the raw cert. It only add to the size of the request which is also not desirable.
As a workaround I tried overwriting the header with a set-header configmap but this does not seem to work. Currently my workaround will be a custom nginx.conf.tmpl but this is something I do not like for obvious reasons.
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
Use a client cert for authentication and use the echoservice to check if the headers are send to the backend.
Anything else we need to know:
The text was updated successfully, but these errors were encountered: