From a364ef374fa2372eea9ec5ba2fef2b4bf6c68234 Mon Sep 17 00:00:00 2001 From: Colin Hom Date: Wed, 12 Oct 2016 17:11:42 -0700 Subject: [PATCH] [etcd tls] design doc --- design/cluster_tls.md | 201 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 201 insertions(+) create mode 100644 design/cluster_tls.md diff --git a/design/cluster_tls.md b/design/cluster_tls.md new file mode 100644 index 00000000..eba990cf --- /dev/null +++ b/design/cluster_tls.md @@ -0,0 +1,201 @@ +# etcd cluster TLS + +## Abstract + +The primary goals kube-etcd-controller cluster TLS: + * Encrypt etcd client/peer communication + * Cryptographically attestable identites for following components: + * etcd controller + * etcd cluster TPR objects + * backup tool pods + * etcd pods + * Cryptographically enforced cluster isolation (backup pod from cluster A CANNOT possibly talk to etcd pod in cluster B) + +## Intra-Cluster PKI overview + +Here is the overview for kube-etcd-controller TLS flow, which should set us up well for integrating with pre-existing external PKI. + +### Trust delegation diagram: + + ----------------- + | external PKI | (something that can sign the controller's CSRs) + ----------------- + | | + | | /|\ CERT + | | | | + | | | | + | | CSR \|/ + | | + | | + | | + | |---> [ controller client-interface CA ] + | | + | | --------------> [ etcd-cluster-A client-interface CLIENT CERT ] + | | | + | | DIRECT | SIGN + | | | + | |--------> [ etcd-cluster-A client-interface CERTIFICATE AUTHORITY ] + | | | + | D | | etcd-cluster-A-0000 + | I | |-------------> [ client-interface SERVER CERT ] + | R | /|\ CERT | + | E | | | | etcd-cluster-A-0001 + | C | CSR \|/ |-------------> [ client-interface SERVER CERT ] + | T | | + | | | etcd-cluster-A-0002 + | S | |-------------> [ client-interface SERVER CERT ] + | I | | + | G | | cluster-A-backup-tool + | N | |-------------> [ client-interface CLIENT CERT ] + | | + | | + | | + | | --------------> [ etcd-cluster-B client-interface CLIENT CERT ] + | | | + | | DIRECT | SIGN + | | | + | |--------> [ etcd-cluster-B client-interface CERTIFICATE AUTHORITY ] + /|\ | CERT | | + | | | | | etcd-cluster-B-0000 + | | | | |------> ... + CSR | \|/ | + | | ... + | + | + |------> [ controller peer-interface CA ] + | + | + |--------> [ etcd-cluster-A peer interface CERTIFICATE AUTHORITY ] + | | + D | | etcd-cluster-A-0000 + I | |-------------> [ peer-interface SERVER CERT ] + R | /|\ CERT | + E | | | | etcd-cluster-A-0001 + C | CSR \|/ |-------------> [ peer-interface SERVER CERT ] + T | | + | | etcd-cluster-A-0002 + S | |-------------> [ peer-interface SERVER CERT ] + I | + G | + N | + |--------> [ etcd-cluster-B peer interface CERTIFICATE AUTHORITY ] + | | + | | etcd-cluster-B-0000 + | |------> ... + | + | ... + + + +### Certificate signing procedure + +1. kube-etcd-controller pod startup: + * generate `controller CA` private key + * generate `controller CA` certificate (peer and client) (select one of following) + * generate self-signed cert (default for now, useful for development mode) + * generate CSR, wait for external entity to sign it and return cert via Kubernetes API (production mode, allows integration with arbitrary external PKI systems) + +2. etcd cluster creation (in controller pod): + * generate private key + * generate `controller CA` as a subordinate CA of `cluster CA` using parameter from cluster spec + +3. etcd node pod startup (in the etcd pod, prior to etcd application starting): + * generate private key + * generate a CSR for `CN=etcd-cluster-xxxx`, submit for signing via annotation (peer and client) + +4. etcd node enrollment (in controller pod) (peer and client) + * observe new CSR annotation on `pod/etcd-cluster-xxxx` + * sign CSR with the `cluster CA` for `pod/etcd-cluster-xxxx` + * --> return certificate via annotation to `pod/etcd-cluster-xxxx` + +5. etcd node startup (in etcd pod) + * observe new signed certificate in annotation on `pod/etcd-cluster-xxxx` (peer and client) + * bring up etcd application with private key, peer cert, client cert, and `cluster CA` certificate + +### Signging Mechanisms + +#### Direct Sign (intra-component) + + [ signer ] + | + | + DIRECT | SIGN + | + | + -----> [ signee ] + +In the case that the _signer_ and _signee_ are within the same component, we have the _signer's_ private key material immediately available to produce a signed certificate for the _signee_. No need for CSR exchange. + +#### CSR/Cert exchange (inter-component) + + [ signer ] + | + /|\ CERT | + | | | + | | | + CSR \|/ | + -----> [ signee ] + + +This is a symbol for a _signee_ submitting a CSR to a _signer_, and recieving back a signed certificate back. + +In the case of kube-etcd-controller, this will be coordinated via the Kubernetes API server. + +----- + +Here are the steps: + +1. _signer_ schedules _signee_ pod to the Kubernetes cluster + +2. _signer_ sets up a watch on _signee_ + +3. _singee_ sets up a watch on _signer_ + +4. _signee_ generates a private key and then a CSR, containing desired metadata + +5. _signee_ annotates itself with `kubeEtcdCSR=` + +6. _singer_ sees `kubeEtcdCSR` annotation, verifies metadata, and generates a signed certificate from the incoming CSR + +7. _signer_ annotates _signee_ pod with `kubeEtcdCert=
  • controller peer ca
  • controller client ca
  • | CERTIFICATE AUTHORITY | +| controller | clusterA peer ca | etcd-xxxx | etcd-xxxx-peer-interface | SERVER CERTIFICATE | +| controller | clusterA client ca | etcd-xxxx | etcd-xxxx, client-interface | SERVER CERTIFICATE | +| controller | clusterA client ca | clusterA-backup-tool | clusterA-backup-tool, client ce | CLIENT CERTIFICATE | + +## Things to note: +* **Private Keys Stay Put:** If a private key is needed, is its generated on and never leaves the component that uses it. The business of shuffling around private key material across networks is a dangerous business. + + Most importantly, the external PKI component must be allowed to sign the controller's CSR _without_ divulging it's CA private key to the cluster. + +* **Separate peer and client cert chains:** The motivation is to provide the ability to isolate the etcd peer (data) plane from the etcd client (control) plane. + + The client interface CA will be expected to sign CSRs for any new entity that wants to "talk to" the cluster- this includes entirely external components like backup controllers, load-balancers, etc. + + The peer interface CA, on the other hand, will sign CSRs only for new entities that want to join the cluster. + +* **CSR attestation:** As of now, there has been discussion (but no planning done) towards providing a discrete mechanism for a _signer_ to verify that an incoming CSR is actually from the claimed _signee_ before producing a certificate. + + It's unclear what the role or scope of such a mechanism should be, in light of the fact that the CSR metadata is already tied to a Kubernetes object. + + In theory, Kubernetes-provided isolation mechanisms alone should allow a _signer_ to: + * create a _signee_ pod + * observe an `kubeEtcdCSR` annotation on that _signee_ pod + * be gauranteed that the _signee_ pod itelf annotated that CSR. + + +