Sounds great, thanks for the clarification! Cheers,
Derek On Sat, Jun 3, 2023 at 12:48 AM Dinesh Joshi <djo...@apache.org> wrote: > On Jun 2, 2023, at 9:06 PM, Derek Chen-Becker <de...@chen-becker.org> > wrote: > > This certainly looks like a nice addition to the operator's tools for > securing cluster access. Out of curiosity, is there anything in this work > that would *preclude* a different authentication scheme for internode at > some point in the future? Has there ever been discussion of pluggability > similar to the client protocol? > > > This is a pluggable implementation so it's not mandatory to use it and > doesn't preclude one from using a different mechanism in the future. We > haven't explicitly discussed pluggability i.e. part of protocol negotiation > in the past for internode connections. However, this work also does not > preclude us from implementing such changes. If we do add negotiation this > could be one of the authentication mechanisms. So it would be complimentary. > > > Also, am I correct in understanding that this would allow for multiple > certificates for the same identity (e.g. distinct cert per node)? I > certainly understand the decision to keep things simple and have all nodes > share identity from the perspective of operational simplicity, but I also > don't want to get in a situation where a single compromised node would > require an invalidation and redeployment on all nodes in the cluster. > > > I don't recommend all nodes share the same certificate. Each node in the > cluster should obtain a unique certificate with the same SPIFFE. In the > event a node is compromised, the operator can revoke that node's > certificate without having to redeploy to all nodes in the cluster. > > thanks, > > Dinesh > -- +---------------------------------------------------------------+ | Derek Chen-Becker | | GPG Key available at https://keybase.io/dchenbecker and | | https://pgp.mit.edu/pks/lookup?search=derek%40chen-becker.org | | Fngrprnt: EB8A 6480 F0A3 C8EB C1E7 7F42 AFC5 AFEE 96E4 6ACC | +---------------------------------------------------------------+