Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configurable key types and signature algorithms for Teleport CAs #22505

Closed
programmerq opened this issue Mar 1, 2023 · 3 comments
Closed

Configurable key types and signature algorithms for Teleport CAs #22505

programmerq opened this issue Mar 1, 2023 · 3 comments
Assignees
Labels
c-ju Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements to-be-reviewed This issue needs to be reviewed by Engineering and Product

Comments

@programmerq
Copy link
Contributor

What would you like Teleport to do?

When initializing or rotating the Teleport Certificate Authorities, it should be possible to specify the key size and algorithm used for the CAs.

What problem does this solve?

Some more restrictive TLS policies (RHEL 8's FUTURE policy, for example) require an RSA key to be larger than 2048 bits.

If a workaround exists, please include it.

No workaround. The 2048 bit key size is hardcoded for both software and PKCS certificate authority creation functions.

https://github.com/gravitational/teleport/blob/v12.0.4/api/constants/constants.go#L144
https://github.com/gravitational/teleport/blob/v12.0.4/lib/auth/native/native.go#L92
https://github.com/gravitational/teleport/blob/v12.0.4/lib/auth/keystore/pkcs11.go#L133

@programmerq programmerq added the feature-request Used for new features in Teleport, improvements to current should be #enhancements label Mar 1, 2023
@ymazzer
Copy link

ymazzer commented Mar 29, 2023

Hi,

Would be very great combined with the possibility to use other keytypes as explained in #3489.

@Knezevich Knezevich added the to-be-reviewed This issue needs to be reviewed by Engineering and Product label Apr 20, 2023
@gauravdhy gauravdhy added the c-ju Internal Customer Reference label Apr 20, 2023
@jdconti jdconti mentioned this issue May 30, 2023
14 tasks
@zmb3
Copy link
Collaborator

zmb3 commented May 30, 2023

For this and #3489 make sure to include plans/docs for how to migrate existing clusters to the new key types / algorithms.

@nklaassen nklaassen changed the title Allow Teleport Administrators to specify key size and algorithm for Teleport CA cert Configurable key types and signature algorithms for Teleport CAs Jun 27, 2023
@nklaassen
Copy link
Contributor

This is tracked in #28392 and support will be released in 17.0.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c-ju Internal Customer Reference feature-request Used for new features in Teleport, improvements to current should be #enhancements to-be-reviewed This issue needs to be reviewed by Engineering and Product
Projects
None yet
Development

No branches or pull requests

6 participants