-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypt traffic on the data-path "natively" #11239
Comments
A few quick thoughts/answers:
|
This issue is stale because it has been open for 90 days with no |
/lifecycle frozen |
This looks like it will be solved by #11906 /close |
@evankanderson: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
In what area(s)?
/area networking
Describe the feature
Currently, whenever we're asked on how the traffic inside of Knative can be secured, our default answer (I think) is: Use a service mesh and enable mTLS.
I guess that works in theory, but it has a ton of drawbacks coming with it. Among others: It forces the additional sidecar everywhere, which a) increases overhead and b) makes our data-plane actively worse as the activator has to deal with non-pod-addressability in the mesh case.
We also had a few users (read customers) ask specifically for a solution to encrypt traffic on the data-path without having to buy into the increased overhead that a mesh brings with it.
So: Can and should we solve this use-case "natively" within Knative? Personally, I think we should.
Thinking about potential designs for this, a few key questions come to mind:
On passthrough encryption
Passthrough encryption certainly would be the best escape hatch here, as it'd allow us to defer this completely to the user's application. However, I don't believe we can implement that with our current assumptions. We need to have the ability to change headers of a request to allow for our routing to work. Even if we solved that, we need to be able to count requests for our autoscaling to work. Encrypted traffic wouldn't allow us to do either AFAIK (not an expert, more than happy to be wrong here).
The text was updated successfully, but these errors were encountered: