-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Securing the gossip protocol? #1322
Comments
It might happen sometime in the future, but I wouldn't hold your breath. |
I am also interested in this. Would it have to be TLS? It seems like the newly introduced Would this be an improvement which would be accepted by the project? If so, I might try to integrate and test this. |
I'd prefer not to get into ad-hoc security mechanisms that some of our dependencies happen to support, that could bring with it the same maintenance challenges we're currently trying to avoid with auth elsewhere. |
The trouble is that dependency does make securing it non-trivial since it likes to mix up UDP and TCP, so most of the usual tricks like putting stunnel in front of it don't work. It's kind of glaring because Prometheus everywhere else can be secured with TLS, but this can't. Would you be open to a patch which (at least currently) traded some performance of the gossip protocol for allowing a set of regular TLS parameters? - i.e. a flag which enables encryption and limits the gossip library to using TCP only so regular TLS can be used? I wouldn't think that would constrain the future too much, since pretty much everything uses TLS in some form, and if you stick with gossip then nothing stops expanding the choice later to use whatever mechanism that allows. |
I think options for our standard |
@wrouesnel #1763 adds a design document as well as a prove of concept implementation to secure the gossip traffic. Please have a look. I would be interested in your thoughts. |
@simonpasquier @brian-brazil @mxinden I would be interested in tackling this, just curious if the linked proposal doc is up to date? https://github.com/prometheus/alertmanager/blob/master/doc/design/secure-cluster-traffic.md |
Hello, AFAIK, we would like to reuse the same TLS code that the node_exporter is using. |
Very cool!
It should be. But in the meantime multiple things happened:
@lilic let me know if this is of some help. |
Cool! @sharadgaur and I were waiting for a couple things to happen before continuing #2237:
Looks like the latter hasn't happened yet. Has the former? |
The former happened. |
@lilic Hi! I just wanted to see where you are at with this. My team and I are also looking to have all traffic secure by default and are interested in the state of this work. |
@iplay88keys I was under the impression @hooten was continuing the work first? IF this is not the case @iplay88keys feel free to take over this issue! |
Yes. @sharadgaur and I would like to continue the work we’ve done. Thanks! |
I'd appreciate a review of #2237! |
Is there anyway at the moment to add TLS authentication to the gossip protocol (or is it secure as-is?)
I need to comply with a policy that all traffic is encrypted by default within our infrastructure, so ideally there'd be support for specifying TLS server and client certificates on the command line to secure connections. Is this in the roadmap somewhere?
The text was updated successfully, but these errors were encountered: