Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] - Authenticators should validate TLS certificate #2329

Open
krassowski opened this issue Mar 15, 2024 · 1 comment
Open

[BUG] - Authenticators should validate TLS certificate #2329

krassowski opened this issue Mar 15, 2024 · 1 comment
Labels

Comments

@krassowski
Copy link
Member

Describe the bug

Currently the TLS validation is turned off. This is handy when deploying locally/without certificate (/with self-signed certificate). However, this reduces security in deployments which do use proper certificates.

Problematic places are the conda-store Authenticator:

JupyterHub Authenticator:

Of note, ithe dask Authenticator does not disable TLS verification, which suggests that it should not work on local deployments (I had not tested it)

Expected behavior

TLS validation is on/off conditionally on whether a certificate is set up.

All authenticators set the TLS verification based on a configuration variable which has a default based on certificate presence.

OS and architecture in which you are running Nebari

2024.3.2

How to Reproduce the problem?

Command output

No response

Versions and dependencies used.

No response

Compute environment

None

Integrations

No response

Anything else?

No response

@krassowski
Copy link
Member Author

There is appropriate logic in Keycloak setup itself:

should_verify_tls = config.certificate.type != CertificateEnum.selfsigned

@marcelovilla marcelovilla removed the needs: triage 🚦 Someone needs to have a look at this issue and triage label May 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: New 🚦
Development

No branches or pull requests

2 participants