Clarification on rotation of custom Intermidary certs #13464
Unanswered
davehouser1
asked this question in
Q&A
Replies: 1 comment 2 replies
-
|
If you provide your own root cert, that is the root of trust for your cluster. If it expires, all trust for TLS certificates within your cluster will break. All certificates in the chain (root, intermediates, and leaf) need to be valid in order for certificates to work. Intermediate and leaf certificates can be rotated fairly effortlessly, but because the hash of the root CA is encoded in the secure join token, any changes to that cert (including extending its validity) will require updating tokens on nodes. See: Lines 160 to 165 in 696dd9d |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello, I have posted about using custom intermediary certs for K3s in the past. I already understand its best to use the custom certs at deployment time on your main K3s server node. I have already tested this and it works, certs are signed properly, added etcd nodes and agent nodes use the certs as well, all good.
I am looking for clarification on what happens when these certs expire, as in the certs that I generated to be used at deployment. From this page I am referring to this section
Lets say the expiration date is set to 365 days for these. Does the expiration date matter? Are these certs used only once to generate K3s certs then never again? Or does the expiration date matter and these certs need to be rotated as well?
I read through this section It seems that the expiration time does matter, and I need to generate new ones, stage them in a specific directory, then run the
k3s certificate rotate-ca --forceto rotate them. It also seems that I can only use generate intermediary certs if they are generated form the same root CA the original ones were generated form. Is that true? I would plan to generate a new root-ca.pem, intermediate-ca.pem, intermediate-ca.key before the expiration time, load them into a K3s main etcd server node, and rotate. Also, does it matter which node I use?Can someone confirm this?
Beta Was this translation helpful? Give feedback.
All reactions