Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mission: Trusted TLS everywhere! #2

Open
9 tasks
JJGadgets opened this issue May 14, 2023 · 0 comments
Open
9 tasks

Mission: Trusted TLS everywhere! #2

JJGadgets opened this issue May 14, 2023 · 0 comments
Assignees

Comments

@JJGadgets
Copy link
Owner

JJGadgets commented May 14, 2023

To be clear, the threat to protect against here is network sniffing on cluster network, which is highly unlikely compared to other attack vectors but this is HomeLab, who cares if it's overkill lol

  • Rook Ceph in-cluster RGW (S3 object storage), fix HTTPS
  • Fix external-proxy-x HAProxy ssl-verify (point to system trusted CA store, still having issues after that)
  • Database connections (e.g. Postgres) (Can Let's Encrypt and custom service hostnames be used?)
  • Ingress HTTP to service (easier to perform thanks to custom SNI in request)
  • Pod-to-pod (ambitious for non-critical workloads, must-have for infra-related or critical workloads like monitoring endpoints, Prom to app etc)
  • Find where to maintain CA in (HashiCorp Vault? OPNsense? YubiKey storage for root CA? Generate on YubiKey for true HSM "zero-trust", or generate on local and transfer to YubiKey for HA/redundancy?)
  • Cilium L7 inspection
  • Kubernetes components (apiServer etc)
  • mTLS Client Auth for Device Authorization (e.g. for services that require authentication but not identification)
@JJGadgets JJGadgets self-assigned this May 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant