-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auto-provision a signed TLS certificate for proxy with LetsEncrypt #4117
Comments
Great idea. The way that Caddy does this is incredibly simple to use. |
+1 for this, our marketplace image is bundled with LetsEncrypt but it's just for DNS based verification, but I ended out using an external DNS so installed certbot. What's our thoughts of local testing / setup? Maybe we just recommend people use https://github.com/FiloSottile/mkcert |
The certbot installed there should work with the regular ACME
I haven't actually used It's worth noting that one disadvantage would be that it would prevent IoT/node tunnelling (joining via port 3080) from working out of the box, unless you could also add those certs to the certificate chain somehow on the remote node such that Go can use them. Then again, this would also be an issue when using self-signed certs unless running with |
Optional extra goal: allow endpoints to be overridden so that users can use other ACME-compatible providers if LetsEncrypt is not to their liking. |
This is related to #3815 |
The request for automatic LetsEncrypt integration becomes much more relevant with AAP because we currently expect people to mostly either:
We should seriously think about automating the certificate part as an optional setting so that people can have Teleport installs which just do the right thing out of the box. |
@klizhentas Was this covered as part of #5178? We now have some ACME support, but I'm not sure whether it handles wildcard/multiple SNIs for |
This still needs docs |
Closing this issue as the initial ACME support have been rolled out and the feature is outlined in our getting started guides. |
Feature Request
Consider compiling a LetsEncrypt client into teleport to make setup easier.
A proxy can attempt to get certs for itself before falling back to self-signed certs.
Of course, we should always respect user-provided certificate first.
What if a proxy is behind a load-balancer that terminates TLS?
The ACME challenge will fail and proxy should fall back to self-signed certs.
Examples of this in the wild:
Motivation
The proxy today automatically provisions self-signed certificates.
This is better than no TLS, but has a few downsides:
--insecure
to the CLIIt's 2020, TLS can be made simple and automatic.
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered: