Sample configuration for HTTP and Network mTLS using envoy yaml
Sample demonstrates two types of mtls validation for the Downstream client (client
-> envoy_server
)
client -> (mTLS) -> envoy -> (TLS) -> upstream
This will validate client
-> envoy_server
over mTLS, using an external service as the source for valid certificate hashes.
(auth_api_cluster)
^
|
(TLS)
^
|
client -> (mTLS) -> envoy -> (TLS) -> upstream
See: extensions.filters.network.client_ssl_auth.v3.ClientSSLAuth
TBH...i'm not sure why you'd use client_ssl_auth
versions since the external REST server it calls to validate a cert MUST send back ALL valid certificates....this is just poor.
- Download envoy
** NOTE ** we are using the envoy 1.21.0
docker cp `docker create envoyproxy/envoy-dev:latest`:/usr/local/bin/envoy .
./envoy version: 2e6db8378477a4a63740746c5bfeb264cd76bc34/1.21.0-dev/Clean/RELEASE/BoringSSL
- Run envoy_server
Each scenario has its own yaml
file with just the components required. Run the appropriate version to test with
Note about curl
:
Update 8/17/21
:
The curl version >7.74 does not work anymore :( after https://curl.se/docs/CVE-2020-8286.html.
TBH, i think there is an issue with that fix itself herewhere it it does not check if the OCSP stapled response was signed by some dedicate CA even if its in the chain.
# $ curl --version
# curl 7.74.0 (OpenSSL/1.1.1k zlib/1.2.11
curl -v -H "host: http.domain.com" \
--resolve http.domain.com:8081:127.0.0.1 \
--cert certs/client.crt \
--key certs/client.key \
--cacert certs/tls-ca-ocsp-chain.pem \
--cert-status \
https://http.domain.com:8081/get
# gives the error: curl: (91) Error computing OCSP ID
so as a workaround,we use a lower version to test with:
docker run --net=host \
-v `pwd`/certs/:/certs curlimages/curl:7.73.0 -vvv \
-H "host: http.domain.com" \
--resolve http.domain.com:8081:127.0.0.1 \
--cert /certs/client.crt --key /certs/client.key \
--cacert /certs/tls-ca-chain.pem --cert-status https://http.domain.com:8081/get
- The client will establish a mTLS with envoy_server.
- Envoy Server will validate the presented client certificate against a list of approved CAs.
- Envoy will send down the OCSP stapled for the server
- curl with require OCSP stapled response and validate the cert
./envoy -c envoy_1.yaml -l debug
docker run --net=host \
-v `pwd`/certs/:/certs curlimages/curl:7.73.0 -vvv \
-H "host: http.domain.com" \
--resolve http.domain.com:8081:127.0.0.1 \
--cert /certs/client.crt --key /certs/client.key \
--cacert /certs/tls-ca-chain.pem --cert-status https://http.domain.com:8081/get
Anyway, lets take a careful look at envoy_1.yaml
:
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
require_client_certificate: true
common_tls_context:
tls_certificates:
- certificate_chain:
filename: certs/http_server.crt
private_key:
filename: certs/http_server.key
ocsp_staple:
filename: certs/http_server_ocsp_resp_valid.bin
validation_context:
only_verify_leaf_cert_crl: true
trusted_ca:
filename: certs/tls-ca-chain.pem
crl:
filename: certs/tls-ca-valid.crl
When you run the client, you'll see the mtls and the server's cert was OCSP validated
$ docker run --net=host \
-v `pwd`/certs/:/certs curlimages/curl:7.73.0 -vvv -H "host: http.domain.com" \
--resolve http.domain.com:8081:127.0.0.1 \
--cert /certs/client.crt --key /certs/client.key \
--cacert /certs/tls-ca-chain.pem --cert-status https://http.domain.com:8081/get
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /certs/tls-ca-chain.pem
* CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [6 bytes data]
* TLSv1.3 (IN), TLS handshake, Request CERT (13):
{ [212 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [2735 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Certificate (11):
} [2141 bytes data]
* TLSv1.3 (OUT), TLS handshake, CERT verify (15):
} [264 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: C=US; O=Google; OU=Enterprise; CN=http.domain.com
* start date: Jul 10 19:29:07 2020 GMT
* expire date: Jul 10 19:29:07 2022 GMT
* subjectAltName: host "http.domain.com" matched cert's "http.domain.com"
* issuer: C=US; O=Google; OU=Enterprise; CN=Enterprise Subordinate CA
* SSL certificate verify ok.
* SSL certificate status: good (0)
A couple of things to note:
-
require_client_certificate: true
This bit is what this repo is about. -
ocsp_staple
This specifies where to find the OCSP file to staple back to the client. See theOCSP
section below about the format -
crl
These specify theCRL
s files for both the parent and subordinate CA. As mentioned above, the client cert is valid. -
only_verify_leaf_cert_crl: true
This checks the CRL for any CA thats part of chain. In our case, we have a parent CA and a subordinate CA.
However, i have not been able to verify the full crl chain (i.,e make it work if its set tofalse
)...this is a TODO. If you do not specify a crl, you don't need to set this
Now test an envoy config where the client certificate is revoked. We do this by setting the CRL filename to revoked version
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
require_client_certificate: true
common_tls_context:
tls_certificates:
- certificate_chain:
filename: certs/http_server.crt
private_key:
filename: certs/http_server.key
ocsp_staple:
filename: certs/http_server_ocsp_resp_valid.bin
validation_context:
only_verify_leaf_cert_crl: true
trusted_ca:
filename: certs/tls-ca-chain.pem
crl:
filename: certs/tls-ca-revoked.crl
We can also verify the client's view of the server's cert by intentionally sending down a revoked OCSP stapled cert. This is pretty contrived but shows how the client can validate the server's OCSP Stapled data
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
require_client_certificate: true
common_tls_context:
tls_certificates:
- certificate_chain:
filename: certs/http_server.crt
private_key:
filename: certs/http_server.key
ocsp_staple:
filename: certs/http_server_ocsp_resp_revoked.bin
validation_context:
only_verify_leaf_cert_crl: true
trusted_ca:
filename: certs/tls-ca-chain.pem
crl:
filename: certs/tls-ca-valid.crl
With this configuration, you will see the following error
$ docker run --net=host \
-v `pwd`/certs/:/certs curlimages/curl:7.73.0 -vvv \
-H "host: http.domain.com" --resolve http.domain.com:8081:127.0.0.1 \
--cert /certs/client.crt --key /certs/client.key \
--cacert /certs/tls-ca-chain.pem --cert-status https://http.domain.com:8081/get
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: C=US; O=Google; OU=Enterprise; CN=http.domain.com
* start date: Jul 10 19:29:07 2020 GMT
* expire date: Jul 10 19:29:07 2022 GMT
* subjectAltName: host "http.domain.com" matched cert's "http.domain.com"
* issuer: C=US; O=Google; OU=Enterprise; CN=Enterprise Subordinate CA
* SSL certificate verify ok.
* SSL certificate status: revoked (1) <<<<<<<<<<<<<<<<<<<<<<
* SSL certificate revocation reason: (UNKNOWN) (-1)
You can also opt to very the client cert presented using the hash value
An optional list of base64-encoded SHA-256 hashes. If specified, Envoy will verify that the SHA-256 of the DER-encoded Subject Public Key Information (SPKI) of the presented certificate matches one of the specified values.
For our client certificate, its
$ openssl x509 -in client.crt -noout -pubkey | openssl pkey -pubin -outform DER | openssl dgst -sha256 -binary | openssl enc -base64
jAKNnM50a5COFYrdrpWqTSiRP38Lr7GzyDnPWNe39DI=
so the configuration is
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
require_client_certificate: true
common_tls_context:
tls_certificates:
- certificate_chain:
filename: certs/http_server.crt
private_key:
filename: certs/http_server.key
ocsp_staple:
filename: certs/http_server_ocsp_resp_valid.bin
validation_context:
verify_certificate_spki:
- "jAKNnM50a5COFYrdrpWqTSiRP38Lr7GzyDnPWNe39DI="
In this section we will use the network TLS filter envoy.filters.network.client_ssl_auth
extensions.filters.network.client_ssl_auth.v3.ClientSSLAuth
To use this, we will need an external server which accepts the TLS client hash, validates it and then return a decision if its acceptable or not
So run our external server
$ go run src/server/main.go
The server responds back to REST calls
$ curl -s --cacert certs/tls-ca.crt -H "host: certserver.domain.com" \
--resolve certserver.domain.com:18080:127.0.0.1 https://certserver.domain.com:18080/v1/certs/list/approved | jq '.'
{
"certificates": [
{
"fingerprint_sha256": "492d412c90b7d1747f02583d03dbf52e009fde113dd454bd5de572bde6595efc"
}
]
}
Note that the fingerprint is our client certificate
$ openssl x509 -in certs/client.crt -outform DER | openssl dgst -sha256 | cut -d" " -f2
492d412c90b7d1747f02583d03dbf52e009fde113dd454bd5de572bde6595efc
what this means is that the external server will ONLY trust one certificate
as a side now..i have no idea how this design is scaleable...i mean, the external server must return ALL the certificates that are valid as a list
This is a really poor design ...I suspect this mode isnt' used...
Anyway, lets run the server
envoy_2.yaml
,
Note the filter setting here points to an external cluster auth_api_cluster
filter_chains:
- filters:
- name: envoy.filters.network.client_ssl_auth
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.client_ssl_auth.v3.ClientSSLAuth
stat_prefix: client_authn
auth_api_cluster: cert_service
refresh_delay: 5s
The cert_server
is the go app server we're running.
On startup, envoy perform healthcheck AND periodicaly asks the external server for list of valid certs...
again, i have no idea how this is scales...
node:
cluster: service_greeter
id: test-id
static_resources:
listeners:
- name: listener_0
address:
socket_address: { address: 0.0.0.0, port_value: 8081 }
filter_chains:
- filters:
- name: envoy.filters.network.client_ssl_auth
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.client_ssl_auth.v3.ClientSSLAuth
stat_prefix: client_authn
auth_api_cluster: cert_service
refresh_delay: 5s
- name: envoy.filters.network.http_connection_manager
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
stat_prefix: ingress_http
codec_type: AUTO
route_config:
name: local_route
virtual_hosts:
- name: local_service
domains: ["*"]
routes:
- match:
prefix: "/"
route:
cluster: service_httpbin
request_headers_to_add:
- header:
key: downstream_peer_fingerprint
value: "%DOWNSTREAM_PEER_FINGERPRINT_256%"
http_filters:
- name: envoy.filters.http.router
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext
require_client_certificate: true
common_tls_context:
tls_certificates:
- certificate_chain:
filename: certs/http_server.crt
private_key:
filename: certs/http_server.key
ocsp_staple:
filename: certs/http_server_ocsp_resp_valid.bin
validation_context:
only_verify_leaf_cert_crl: true
trusted_ca:
filename: certs/tls-ca-chain.pem
clusters:
- name: service_httpbin
connect_timeout: 0.25s
type: strict_dns
lb_policy: round_robin
load_assignment:
cluster_name: service_httpbin
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: httpbin.org
port_value: 443
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext
- name: cert_service
connect_timeout: 0.25s
type: strict_dns
lb_policy: round_robin
load_assignment:
cluster_name: cert_service
endpoints:
- lb_endpoints:
- endpoint:
address:
socket_address:
address: 127.0.0.1
port_value: 18080
health_checks:
- timeout: 1s
interval: 2s
unhealthy_threshold: 3
healthy_threshold: 1
http_health_check:
path: /healthcheck
transport_socket:
name: envoy.transport_sockets.tls
typed_config:
"@type": type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext
common_tls_context:
validation_context:
match_subject_alt_names:
exact: "certserver.domain.com"
trusted_ca:
filename: "certs/tls-ca-chain.pem"
Thats about it...dont' use envoy.extensions.filters.network.client_ssl_auth.v3.ClientSSLAuth
for mtls
First some background on the certificate specifications we will use in these example (you can skip these and come back later)
root-ca.crt
This is the root CA:
$ openssl x509 -in certs/root-ca.crt -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, O=Google, OU=Enterprise, CN=Enterprise Root CA
X509v3 extensions:
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
9A:54:D6:19:21:58:3A:46:B6:D4:AE:05:7E:80:70:F4:38:CF:28:0C
X509v3 Authority Key Identifier:
keyid:9A:54:D6:19:21:58:3A:46:B6:D4:AE:05:7E:80:70:F4:38:CF:28:
This CA has a CRL as well but we have not expired anything:
$ openssl crl -inform PEM -text -noout -in certs/root-ca.crl
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Root CA
Last Update: Dec 31 15:43:50 2021 GMT
Next Update: Feb 4 15:43:50 2023 GMT
CRL extensions:
X509v3 Authority Key Identifier:
keyid:9A:54:D6:19:21:58:3A:46:B6:D4:AE:05:7E:80:70:F4:38:CF:28:0C
Authority Information Access:
CA Issuers - URI:http://pki.esodemoapp2.com/ca/root-ca.cer
X509v3 CRL Number:
2
No Revoked Certificates.
tls-ca.crt
This is the subordinate CA that issues the TLS client and server certificates:
openssl x509 -in certs/tls-ca.crt -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Root CA
X509v3 extensions:
X509v3 Key Usage: critical
Certificate Sign, CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Subject Key Identifier:
BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
X509v3 Authority Key Identifier:
keyid:9A:54:D6:19:21:58:3A:46:B6:D4:AE:05:7E:80:70:F4:38:CF:28:0C
Note that we have two CRLs here: one with a revoked cert and one without. We will later use these separately to test with
$ openssl crl -inform PEM -text -noout -in certs/tls-ca-valid.crl
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Subordinate CA
Last Update: Dec 31 14:49:20 2021 GMT
Next Update: Feb 4 14:49:20 2023 GMT
CRL extensions:
X509v3 Authority Key Identifier:
keyid:BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
Authority Information Access:
CA Issuers - URI:http://pki.esodemoapp2.com/ca/tls-ca.cer
X509v3 CRL Number:
4
No Revoked Certificates.
and
$ openssl crl -inform PEM -text -noout -in certs/tls-ca-revoked.crl
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Subordinate CA
Last Update: Dec 31 15:29:27 2021 GMT
Next Update: Feb 4 15:29:27 2023 GMT
CRL extensions:
X509v3 Authority Key Identifier:
keyid:BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
Authority Information Access:
CA Issuers - URI:http://pki.esodemoapp2.com/ca/tls-ca.cer
X509v3 CRL Number:
5
Revoked Certificates:
Serial Number: 0D
Revocation Date: Dec 12 14:11:52 2020 GMT
Note the Serial Number (0D
), this is the serial number for the client certificate
http_server.crt
This is the certificate the envoy server uses
$ openssl x509 -in certs/http_server.crt -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 7 (0x7)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Subordinate CA
Validity
Not Before: Jul 10 19:29:07 2020 GMT
Not After : Jul 10 19:29:07 2022 GMT
Subject: C = US, O = Google, OU = Enterprise, CN = http.domain.com
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Basic Constraints:
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 Subject Key Identifier:
FF:AE:5E:E3:E9:4A:07:5D:D6:E1:1B:52:CC:1F:66:CB:11:55:78:F6
X509v3 Authority Key Identifier:
keyid:BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
X509v3 Subject Alternative Name:
DNS:http.domain.com
Note the SAN Value
client.crt
This is the certificate the client will present to the envoy server
$ openssl x509 -in certs/client.crt -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 13 (0xd) <<<<<<<<<<<<<<<<<<
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Subordinate CA
Validity
Not Before: Oct 31 18:05:09 2020 GMT
Not After : Oct 31 18:05:09 2022 GMT
Subject: C = US, O = Google, OU = Enterprise, CN = client@domain.com
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Basic Constraints:
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Client Authentication
X509v3 Subject Key Identifier:
7C:26:D4:CD:5B:F5:09:A0:68:65:99:92:4F:AD:A5:B7:CC:40:C4:8E
X509v3 Authority Key Identifier:
keyid:BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
X509v3 Subject Alternative Name:
DNS:client.domain.com
Note the SAN value as well as the serial number (13 (0D)
) which will be used for CRL based validation
Also, we will generate the digest value (we will use this later to indicate valid certificates):
$ openssl x509 -in certs/client.crt -outform DER | openssl dgst -sha256 | cut -d" " -f2
492d412c90b7d1747f02583d03dbf52e009fde113dd454bd5de572bde6595efc
$ openssl x509 -in certs/client.crt -noout -pubkey | openssl pkey -pubin -outform DER | openssl dgst -sha256 -binary | openssl enc -base64
jAKNnM50a5COFYrdrpWqTSiRP38Lr7GzyDnPWNe39DI=
The following just some background commands for CRL's and OCSP
Note the Revoked Certificates
list where the serial number is listed
$ openssl crl -inform PEM -text -noout -in certs/tls-revoked.crl
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C = US, O = Google, OU = Enterprise, CN = Enterprise Subordinate CA
Last Update: Dec 12 14:12:16 2020 GMT
Next Update: Jan 16 14:12:16 2022 GMT
CRL extensions:
X509v3 Authority Key Identifier:
keyid:BF:E1:1C:F0:22:48:8F:FC:3B:CF:5D:D9:ED:AE:88:70:21:DF:DD:86
Authority Information Access:
CA Issuers - URI:http://pki.esodemoapp2.com/ca/tls-ca.cer
X509v3 CRL Number:
3
Revoked Certificates:
Serial Number: 01
Revocation Date: Apr 26 00:31:18 2020 GMT
Serial Number: 0D <<<<<<<<<<<<<<< 0xd = 13
Revocation Date: Dec 12 14:11:52 2020 GMT <<<<<<<<<<<<<<<
Use openssl to test the OCSP Responder:
- Valid server certificate:
$ cd certs/
$ openssl ocsp -index db_valid/tls-ca.db -port 9999 -rsigner ocsp.crt -rkey ocsp.key -CA tls-ca.crt -text -ndays 500
$ openssl ocsp -CA tls-ca.crt -CAfile tls-ca-ocsp-chain.pem -issuer tls-ca.crt -cert http_server.crt -url http://localhost:9999 -resp_text
$ openssl ocsp -CA tls-ca.crt -CAfile tls-ca-ocsp-chain.pem -issuer tls-ca.crt -cert http_server.crt -url http://localhost:9999 -respout http_server_ocsp_resp_valid.bin
Response verify OK
http_server.crt: good
This Update: Dec 17 14:11:55 2020 GMT
Next Update: May 1 14:11:55 2022 GMT
or with openssl client/server
$ openssl s_server \
-status_file http_server_ocsp_resp_valid.bin \
-cert http_server.crt -key http_server.key \
-port 8081 -CAfile tls-ca-ocsp-chain.pem \
-verify_return_error -Verify 1
$ openssl s_client \
-connect localhost:8081 \
-servername http.domain.com \
-CAfile tls-ca-chain.pem \
-cert client.crt \
-key client.key -tls1_3 -tlsextdebug -status --verify 1
- Revoked Server certificate
cd certs/
openssl ocsp -index db_revoked/tls-ca.db -port 9999 -rsigner ocsp.crt -rkey ocsp.key -CA tls-ca.crt -text -ndays 500
openssl ocsp -CA tls-ca.crt -CAfile tls-ca-ocsp-chain.pem -issuer tls-ca.crt -cert http_server.crt -url http://localhost:9999 -resp_text
$ openssl ocsp -CA tls-ca.crt -CAfile tls-ca-ocsp-chain.pem -issuer tls-ca.crt -cert http_server.crt -url http://localhost:9999 -respout http_server_ocsp_resp_revoked.bin
Response verify OK
http_server.crt: revoked
This Update: Dec 17 14:12:51 2020 GMT
Next Update: May 1 14:12:51 2022 GMT
Revocation Time: Dec 12 14:11:52 2020 GMT
-
Envoy, Nginx, Apache HTTP Structured Logging with Google Cloud Logging
-
Envoy External Authorization server (envoy.ext_authz) HelloWorld