You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When filing a bug, please include the following headings if possible. Any example text in this template can be deleted.
Overview of the Issue
Upgrading consul 1.11.8 to 1.12.4 is causing agents set up with auto-encrypt to be left presenting certificates without the intermediate certificate. This then causes trust issues for anything connecting to the client which is bad.
Reproduction Steps
Happens consistently if I up/down grade the version in our test setup.
Consul info for both Client and Server
Consul servers on ubuntu 20.04 v1.11.8
Agents are 1.12.4
Vault as the CA
All running on AWS
TLS enabled with auto-encrypt
Log Fragments
Enabled trace logging
Client logs seem to show AutoEncrypt.Sign RPC call being made successfully
Certificate presented by the clients after auto-config are issued by the intermediate cert, but appear to omit the intermediate cert in the handshake.
Was suspecting the change to the new-style tls config stanza as that seems to be the biggest change, but the lack of error messages make it puzzling. Also have tried various combinations of new-style parameters but have not got it to run.
I am not sure where to look to diagnose what is going on further: seeking some guidance. Is it possible for consul to have lost the intermediate cert or is this a symptom of something else?
The text was updated successfully, but these errors were encountered:
mr-miles
changed the title
Upgrading 1.11 -> 1.12 bqreaking auto-encrypt
Upgrading 1.11 -> 1.12 breaking auto-encrypt
Sep 8, 2022
If I look at /agent/connect/ca/roots then I can see the intermediate certificate as expected, so agent and server definitely know about it. Totally perplexed and basically out of ideas as to where to look for further investigations, so any help much appreciated
When filing a bug, please include the following headings if possible. Any example text in this template can be deleted.
Overview of the Issue
Upgrading consul 1.11.8 to 1.12.4 is causing agents set up with auto-encrypt to be left presenting certificates without the intermediate certificate. This then causes trust issues for anything connecting to the client which is bad.
Reproduction Steps
Happens consistently if I up/down grade the version in our test setup.
Consul info for both Client and Server
Consul servers on ubuntu 20.04 v1.11.8
Agents are 1.12.4
Vault as the CA
All running on AWS
TLS enabled with auto-encrypt
Log Fragments
Enabled trace logging
Client logs seem to show AutoEncrypt.Sign RPC call being made successfully
Server logs don't seem to be showing errors
Certificate presented by the clients after auto-config are issued by the intermediate cert, but appear to omit the intermediate cert in the handshake.
Was suspecting the change to the new-style tls config stanza as that seems to be the biggest change, but the lack of error messages make it puzzling. Also have tried various combinations of new-style parameters but have not got it to run.
I am not sure where to look to diagnose what is going on further: seeking some guidance. Is it possible for consul to have lost the intermediate cert or is this a symptom of something else?
The text was updated successfully, but these errors were encountered: