Open jurjenoskam opened 2 months ago
P-384 is currently unsupported by our ingress proxy. We'll investigate whether we can add it. We do support P-256.
@anthonychu Thank you, but the problem is not that P-384 isn't supported. The problem is that it is possible to install unsupported certificates without any error message at all and that connections to the app are then silently dropped, also without any notification or error message. This, combined with the fact that the documentation doesn't mention which certificate types are supported and which aren't makes this something that people can waste hours on trying to debug.
Thank you for clarifying this @jurjenoskam. Makes sense, we will be adding this. Labeled accordingly.
This issue is a: (mark with an x)
Issue description
Connecting to a Container App using its custom domain results in a "connection reset by peer" when the custom domain is configured to use a EC P-384 certificate. The exact same app works when the custom domain binding is updated to use an RSA certificate. The only difference is the certificate algorithm, everything else is exactly the same (including the custom domain).
Steps to reproduce
aca-demo-ne-osk-am-rsa
andaca-demo-ne-osk-am
as follows:Add-AzKeyVaultCertificate
-VaultName 'cccjokvacane'
-Name 'aca-demo-ne-osk-am-rsa' ` -CertificatePolicy $Policy$Policy = New-AzKeyVaultCertificatePolicy
-IssuerName 'Unknown'
-SubjectName "CN=aca-demo-ne.osk.am,O=Stupendous Enterprises,C=NL"-DnsName "aca-demo-ne.osk.am"
-SecretContentType "application/x-pkcs12"-KeyType 'EC'
-Curve 'P-384'Add-AzKeyVaultCertificate
-VaultName 'cccjokvacane'
-Name 'aca-demo-ne-osk-am' ` -CertificatePolicy $Policy