andyet / teleport

Fork for the purpose of a consulting project October 2019. Privileged access management for elastic infrastructure.
https://gravitational.com/teleport
Apache License 2.0
0 stars 0 forks source link

Technical Questions #3

Closed one000mph closed 5 years ago

one000mph commented 5 years ago
klizhentas commented 5 years ago

Good questions! Some answers below:

https://gravitational.com/teleport/docs/admin-guide/#graceful-restarts

We usually recommend to use systemd units for background operatoin

This is not an expected behavior, so it might be a bug

benarent commented 5 years ago

One extra note on the part of

Where are the self-signed certs located?

This can be a gotcha for some people. Teleport requires a TLS/SSL cert for the proxy, this is in reference to /var/lib/teleport/webproxy_cert.pem if you look at some of our examples we show how to use Letsencypt https://gravitational.com/blog/letsencrypt-teleport-ssh/

For hosts that terminate TLS/SSL at the load balancer we provide the --insecure-no-tls flag. This is handy if you're using ALB https://gravitational.com/teleport/docs/admin-guide/#configuration-flags

We also have this example that shows obtaining it with ACM https://gravitational.com/teleport/docs/aws_oss_guide/#prerequisites

one000mph commented 5 years ago

This is not an expected behavior, so it might be a bug @klizhentas would it be helpful to report the behavior somewhere in your main repo? I can write up steps to reproduce.

klizhentas commented 5 years ago

yes, thank you!

one000mph commented 5 years ago

@benarent On a slightly different tangent with the --insecure flag for Auth service. When I first started up teleport I encountered some issue related to /bin/hostname not matching the proxy subdomain even when using tsh with --insecure flag. Is this a bug also? It seems to contradict the cli docs on the flag: Do not verify server's certificate and host name. Use only in test environments. I get certificate signed by unknown authority without the --insecure flag. When use --insecure and the --proxy=proxy_host does not match the hostname or nodename (when present) I get principal "proxy_host" not in the set of valid principals for given certificate

klizhentas commented 5 years ago

this is a good observation, the way it works is that --insecure is not 100% insecure :) It was introduced to skip Web proxy TLS validation, however it is still at all times verifies the identity of the auth server. In this case we should add better error message and provide some guidance on what users/admins should do, so I would raise it as another UX bug in our OSS github repository.

one000mph commented 5 years ago

it is still at all times verifies the identity of the auth server

OK that's the answer to my question! Thanks.

Updating the CLI docs will definitely help. At a first run I would assume that most people haven't read the CLI docs very deeply so the messaging there isn't as crucial at least for early-stage users. Would it make sense to add an instruction to ensure that nodename matches the value of --proxy during authentication?

I'll think about where to add the info about --insecure - it only affects the proxy cert, but not auth.

one000mph commented 5 years ago

I think these issues on the main repo have already summarized what I experience https://github.com/gravitational/teleport/issues/2910 https://github.com/gravitational/teleport/issues/2040

If you want a new issue though I'm happy to do that!

one000mph commented 5 years ago

Just filed this bug on tsh join https://github.com/gravitational/teleport/issues/3058