You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Todate, the vxlan traffic from peer pods to the cluster is not encrypted.
With the introduction of Secure Comms for Peer Pods(PP), it is possible to open tunnels between the PP and Worker Node (WN) to allow forwarding communication between utilizing the security mechanism already established by SSH.
That is, any communication transferred via a Secure Comms tunnel is secured without the need to introduce additional certificates, key pairs or shared keys.
It is therefore desired to add support for transporting the vxlan traffic via a Secure Comms tunnel.
The text was updated successfully, but these errors were encountered:
vxlan seem to have limitations affecting what we can and cannot do.
It listens always on all interfaces (0.0.0.0:)
It sends only to the port number it listens on
When combined, this means we are required to use a second NS to capture the vxlan traffic locally and send it over Secure Comms
Additionaly, we need to better control what traffic reaches the vxlan underlay. Having vxlan underlay listening on all interfaces as in 0.0.0.0: is a security issue which we need to close. This is also solved when we add a NS...
Todate, the vxlan traffic from peer pods to the cluster is not encrypted.
With the introduction of Secure Comms for Peer Pods(PP), it is possible to open tunnels between the PP and Worker Node (WN) to allow forwarding communication between utilizing the security mechanism already established by SSH.
That is, any communication transferred via a Secure Comms tunnel is secured without the need to introduce additional certificates, key pairs or shared keys.
It is therefore desired to add support for transporting the vxlan traffic via a Secure Comms tunnel.
The text was updated successfully, but these errors were encountered: