-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
xpack.security.http.ssl.verification_mode
is missing from the docs
#85375
Comments
Pinging @elastic/es-docs (Team:Docs) |
Pinging @elastic/es-security (Team:Security) |
The fact that this isn't documented is intentional, because it shouldn't ever be set, and the fact that |
|
@lockewritesdocs Yes it can be removed from the |
It turns out not to be just setup-passwords. It looks like reset-password has inherited the same behaviour. I would propose that we migrate away from relying on verification mode, and instead start trusting the actual HTTP server cert instead. That would mean |
I just realised this issue doesn't explain why that setting shouldn't be set. I've explained it elsewhere (possibly on other issues) but it's worth covering here since this has become the main issue for tracking the lack of docs.
For TLS clients there are 3 values, all of which have meaning, and can be useful (although one of them is particularly dangerous and should be used with extreme caution).
For TLS servers there is no such thing as hostname verification of the client's certificate. The server didn't open the connection so it doesn't have an address to check against. (Some servers do non-standard checks involving reverse DNS lookups, but that's not part of TLS or HTTPS). Because of that, there's no case where setting verification mode to
It means, Clients must provide a certificate, but I don't care what certificate it is. That's nonsense. Don't do that. If you don't care about the certs, don't require them. If you configure:
Then there are no certificates to verify (because client authentication is off), so the verification_mode is useless. Given that The minor issue we have is that |
@tvernum thank you for the explanation. I have a followup question about mTLS to Elasticsearch. In Kibana 8.3 documentation, it describes using a TLS client for Kibana authentication, and an Elasticsearch PKI realm for authorization. In other words, use role mapping from the Kibana TLS client's Subject DN to the In that scenario, the Kibana documention says to set What is design intent if |
Kibana mTLS doesn't use client certificates between Kibana and ES (hence needing to set |
Description
xpack.security.http.ssl.verification_mode
is missing from the docs for 8.1. Reference https://www.elastic.co/guide/en/elasticsearch/reference/8.1/security-settings.html .Resolution
in https://www.elastic.co/guide/en/elasticsearch/reference/8.1/trb-security-setup.html, but there is no place to set this property point to its meaning.The text was updated successfully, but these errors were encountered: