--
You received this message because you are subscribed to the Google Groups "Envoy Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to envoy-users+unsubscribe@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/05e7e5f4-c177-4bfd-a066-c1852649a5b5%40googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "Envoy Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to envoy-users+unsubscribe@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/75d52e12-d096-4e51-879c-a8915e51c4bc%40googlegroups.com.
+David/AdamL for visibility in case this is a boringssl issue.AdamG, I think at this point it would be best if you could open a GH issue that provides a self contained way to repro the cert loading problem and then it will be easier to investigate.
--
You received this message because you are subscribed to a topic in the Google Groups "Envoy Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/envoy-users/Y9NhplORK-A/unsubscribe.
To unsubscribe from this group and all its topics, send an email to envoy-users+unsubscribe@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/CAL9PXLzjiTkPixKwZV0zyhNV-h60sXt60LVQEfy%3DmnomO%3DOtaA%40mail.gmail.com.
https://github.com/lyft/envoy/issues/1082 for those not monitoring Envoy repo.
On Fri, Jun 9, 2017 at 6:21 PM, Adam Greene <adam....@gmail.com> wrote:
Hey Adam,I'll start there. I'll try to get to it this evening. Thanks kindly.
On Fri, Jun 9, 2017 at 6:20 PM, 'Adam Langley' via Envoy Users <envoy...@googlegroups.com> wrote:
--On Fri, Jun 9, 2017 at 6:09 PM, Matt Klein <mkl...@lyft.com> wrote:+David/AdamL for visibility in case this is a boringssl issue.AdamG, I think at this point it would be best if you could open a GH issue that provides a self contained way to repro the cert loading problem and then it will be easier to investigate.If it's a parse error of the certs or keys, maybe just send the cert / key.CheersAGL
You received this message because you are subscribed to a topic in the Google Groups "Envoy Users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/envoy-users/Y9NhplORK-A/unsubscribe.
To unsubscribe from this group and all its topics, send an email to envoy-users...@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/CAL9PXLzjiTkPixKwZV0zyhNV-h60sXt60LVQEfy%3DmnomO%3DOtaA%40mail.gmail.com.
Is Envoy acting as a client talking to some backend P-384 servers, or is it trying to serve a P-384 certificate?
--
You received this message because you are subscribed to the Google Groups "Envoy Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to envoy-users+unsubscribe@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/4af41e9b-f4cb-42f1-86a3-239c08673632%40googlegroups.com.
I don't think it's a matter of not healthy. I think the issue is that when Envoy is acting as a client, it's not negotiating the P-384 curve correctly.David, if the server (envoy) serves a P-384 cert, what ECDH config should the client (envoy) have? This is all way beyond me, but I think everything is configurable that we need to be configurable.
There is a larger issue if whether we should have different defaults in general and for client/server.On Sat, Jun 10, 2017 at 3:58 PM, <adam....@gmail.com> wrote:Hi DavidIs Envoy acting as a client talking to some backend P-384 servers, or is it trying to serve a P-384 certificate?I believe the answer is both.The breaking flow is:external client ---> Envoy Edge ---> Envoy Service (serving encrypted http2 w/P-384) --->localhost service (unencrypted)Envoy edge seems to be telling me that no hosts are found in the Envoy Service cluster. So the Envoy Edge seems to be able to serve a P-384, but when envoy edge is talking to Envoy Service, it fails and is thus not registering it as a healthy member of the cluster. Thus the break is with Envoy serving p-384 to an Envoy client. That is my guess anyway.FYI, if I do this (hit envoy service directly):external client ---> Envoy Service (serving encrypted http/1.1 w/P-384) --->localhost service (unencrypted)it works.--You received this message because you are subscribed to the Google Groups "Envoy Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to envoy-users...@googlegroups.com.
On Sat, Jun 10, 2017 at 7:04 PM Matt Klein <mkl...@lyft.com> wrote:I don't think it's a matter of not healthy. I think the issue is that when Envoy is acting as a client, it's not negotiating the P-384 curve correctly.David, if the server (envoy) serves a P-384 cert, what ECDH config should the client (envoy) have? This is all way beyond me, but I think everything is configurable that we need to be configurable.If the server serves a P-384 certificate, that means you are using P-384 ECDSA. The ECDH portion of the protocol can be P-256 or P-384 or whatever.However, until TLS 1.3, it is impossible to advertise different capabilities for ECDH and ECDSA. The client "curve list" applied to both. That is, your DEFAULT_ECDH_CURVES variable is misnamed. It should say DEFAULT_CURVES as it applies to both. If the server serves a P-384 certificate, your client needs to accept P-384 in the curve list for the connection to work.Parameter negotiation in TLS 1.2 and earlier is unfortunately a mess. ECDSA use is affected by three different parameter lists (cipher suites must be an ECDSA cipher, curve list must contain suitable curve, and signature algorithm list must contain ECDSA signing algorithms).
There is a larger issue if whether we should have different defaults in general and for client/server.On Sat, Jun 10, 2017 at 3:58 PM, <adam....@gmail.com> wrote:Hi DavidIs Envoy acting as a client talking to some backend P-384 servers, or is it trying to serve a P-384 certificate?I believe the answer is both.The breaking flow is:external client ---> Envoy Edge ---> Envoy Service (serving encrypted http2 w/P-384) --->localhost service (unencrypted)Envoy edge seems to be telling me that no hosts are found in the Envoy Service cluster. So the Envoy Edge seems to be able to serve a P-384, but when envoy edge is talking to Envoy Service, it fails and is thus not registering it as a healthy member of the cluster. Thus the break is with Envoy serving p-384 to an Envoy client. That is my guess anyway.FYI, if I do this (hit envoy service directly):external client ---> Envoy Service (serving encrypted http/1.1 w/P-384) --->localhost service (unencrypted)it works.--You received this message because you are subscribed to the Google Groups "Envoy Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to envoy-users+unsubscribe@googlegroups.com.
To post to this group, send email to envoy...@googlegroups.com.To view this discussion on the web visit https://groups.google.com/d/msgid/envoy-users/4af41e9b-f4cb-42f1-86a3-239c08673632%40googlegroups.com.
Hey David,
thanks, that was it!
My Envoy and bssl tool both negotiated TLSv1.3, that's why it worked
fine for me :(
Anyway, Adam (Greene), you can add:
"ssl_context": {
"ecdh_curves": "X25519:P-256:P-384"
},
to you cluster configuration and it will work just fine.
David, is there any reason why P-384 shouldn't be enabled by default
when acting as client?
>>>> To post to this group, send email to envoy...@googlegroups.com.
>>>> To view this discussion on the web visit
>>>> https://groups.google.com/d/msgid/envoy-users/CAL9PXLzjiTkPixKwZV0zyhNV-h60sXt60LVQEfy%3DmnomO%3DOtaA%40mail.gmail.com.
>>>>
>>>> For more options, visit https://groups.google.com/d/optout.
>>>
>>>
>>
>>
>>
>> --
>> Matt Klein
>> Software Engineer
>> mkl...@lyft.com / 206.327.4515
>
> --
> You received this message because you are subscribed to the Google Groups
> "Envoy Users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to envoy-users+unsubscribe@googlegroups.com.
> To post to this group, send email to envoy...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/envoy-users/CAF8qwaBpjDm0B9ZA8s-7ASowhWpOyKYxUeGYQxiVJL4gbExj7Q%40mail.gmail.com.
>
> For more options, visit https://groups.google.com/d/optout.
My Envoy and bssl tool both negotiated TLSv1.3, that's why it worked
fine for me :(