Closed one000mph closed 5 years ago
Good questions! Some answers below:
https://gravitational.com/teleport/docs/admin-guide/#graceful-restarts
We usually recommend to use systemd units for background operatoin
This is not an expected behavior, so it might be a bug
/var/lib/teleport/proc
sqlite databaseOne extra note on the part of
Where are the self-signed certs located?
This can be a gotcha for some people. Teleport requires a TLS/SSL cert for the proxy, this is in reference to /var/lib/teleport/webproxy_cert.pem
if you look at some of our examples we show how to use Letsencypt https://gravitational.com/blog/letsencrypt-teleport-ssh/
For hosts that terminate TLS/SSL at the load balancer we provide the --insecure-no-tls
flag. This is handy if you're using ALB https://gravitational.com/teleport/docs/admin-guide/#configuration-flags
We also have this example that shows obtaining it with ACM https://gravitational.com/teleport/docs/aws_oss_guide/#prerequisites
This is not an expected behavior, so it might be a bug @klizhentas would it be helpful to report the behavior somewhere in your main repo? I can write up steps to reproduce.
yes, thank you!
@benarent On a slightly different tangent with the --insecure
flag for Auth service. When I first started up teleport I encountered some issue related to /bin/hostname
not matching the proxy subdomain even when using tsh
with --insecure
flag. Is this a bug also? It seems to contradict the cli docs on the flag: Do not verify server's certificate and host name. Use only in test environments
. I get certificate signed by unknown authority
without the --insecure
flag. When use --insecure
and the --proxy=proxy_host
does not match the hostname
or nodename
(when present) I get principal "proxy_host" not in the set of valid principals for given certificate
this is a good observation, the way it works is that --insecure
is not 100% insecure :) It was introduced to skip Web proxy TLS validation, however it is still at all times verifies the identity of the auth server. In this case we should add better error message and provide some guidance on what users/admins should do, so I would raise it as another UX bug in our OSS github repository.
it is still at all times verifies the identity of the auth server
OK that's the answer to my question! Thanks.
Updating the CLI docs will definitely help. At a first run I would assume that most people haven't read the CLI docs very deeply so the messaging there isn't as crucial at least for early-stage users. Would it make sense to add an instruction to ensure that nodename
matches the value of --proxy
during authentication?
I'll think about where to add the info about --insecure
- it only affects the proxy cert, but not auth.
I think these issues on the main repo have already summarized what I experience https://github.com/gravitational/teleport/issues/2910 https://github.com/gravitational/teleport/issues/2040
If you want a new issue though I'm happy to do that!
Just filed this bug on tsh join
https://github.com/gravitational/teleport/issues/3058
teleport
or is^C
/kill
the right way at the moment?teleport start &
?tsh join
will work only from hosts that can reach the advertised IP of a node such as a public-facing IP or from a client that can access the private IP. For example, from my machine I cantsh join
a remote session if the advertised IP is explicitly set to a public IP but not if it is defaulted tolocalhost
or the private10.x.x.x
IP. This is different from what I expected since it doesn't match the behavior oftsh ssh
. In the Architecture section the diagrams are pretty good at showing how data flows through the proxy server usingtsh ssh
but I'm assuming this doesn't work the same way withtsh join
. Is that correct? Any additional feedback here would be great!/var/lib/teleport/webproxy_cert.pem
but that doesn't appear to be the one that is used. At one point I got a ssh handshake error (which I was able to fix) that had these principles listed `["[host_uuid].[hostname]" "[nodename | hostname]" "remote.kube.proxy.teleport.cluster.local"].