Skip to content

Don't use server_name config for RPC connections#5394

Merged
hanshasselberg merged 2 commits intomasterfrom
no_server_name_rpc
Mar 5, 2019
Merged

Don't use server_name config for RPC connections#5394
hanshasselberg merged 2 commits intomasterfrom
no_server_name_rpc

Conversation

@hanshasselberg
Copy link
Copy Markdown
Member

@hanshasselberg hanshasselberg commented Feb 27, 2019

server_name shouldn't be used for RPC connections. If it is hardcoded, it can never properly work in a multi dc setup, since for that it has to be dynamic to account for forwarding calls into other dcs. Fixes #5357.

This PR contains a bunch of comment wrapping.


if tlsConfig.ServerName == "" {
tlsConfig.ServerName = c.base.NodeName
InsecureSkipVerify: !c.base.VerifyServerHostname,
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since ServerName is not used here anymore, this only depends on VerifyServerHostname now.

tlsConfig.ServerName = c.base.ServerName
if tlsConfig.ServerName == "" {
tlsConfig.ServerName = c.base.NodeName
}
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OutgoingTLSConfigForChecks is the only place where we allow setting it now. Even that I find questionable... But I don't want to change to many things at once.

require.Equal(t, tlsConf.ServerName, "consul.example.com")
require.False(t, tlsConf.InsecureSkipVerify)
require.Empty(t, tlsConf.ServerName)
require.True(t, tlsConf.InsecureSkipVerify)
Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was thinking about this test, which I had to change to make it pass.
It is skipping the builtin check from golang tls, but we are still checking the cert chain. Since VerifyServerHostname is disabled, we do not check that. I think this is what we want.

@hanshasselberg hanshasselberg requested a review from a team February 27, 2019 16:22
Copy link
Copy Markdown
Member

@mkeeler mkeeler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was a good find. You are absolutely correct that our usage of server names in outgoing TLS RPC connections was not good.

@hanshasselberg hanshasselberg merged commit eb0895c into master Mar 5, 2019
@banks banks deleted the no_server_name_rpc branch April 16, 2019 09:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants