2018-05-29 21:07:40 +00:00
|
|
|
---
|
2020-04-07 18:55:19 +00:00
|
|
|
layout: docs
|
|
|
|
page_title: Connect - Security
|
2018-05-29 21:07:40 +00:00
|
|
|
description: |-
|
2018-06-21 18:36:01 +00:00
|
|
|
Connect enables secure service-to-service communication over mutual TLS. This
|
|
|
|
provides both in-transit data encryption as well as authorization. This page
|
|
|
|
will document how to secure Connect.
|
2018-05-29 21:07:40 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Connect Security
|
|
|
|
|
|
|
|
Connect enables secure service-to-service communication over mutual TLS. This
|
|
|
|
provides both in-transit data encryption as well as authorization. This page
|
2019-10-14 15:40:35 +00:00
|
|
|
will document how to secure Connect. To try Connect locally, complete the
|
2022-08-26 05:49:29 +00:00
|
|
|
[Getting Started guide](/consul/tutorials/gs-consul-service-mesh/service-mesh?utm_source=docs) or for a full security model reference,
|
2022-01-10 23:36:16 +00:00
|
|
|
see the dedicated [Consul security model](/docs/security) page. When
|
2022-08-26 05:49:29 +00:00
|
|
|
setting up Connect in production, review this [tutorial](/consul/tutorials/developer-mesh/service-mesh-production-checklist?utm_source=docs).
|
2019-10-14 15:40:35 +00:00
|
|
|
|
2018-05-29 21:07:40 +00:00
|
|
|
Connect will function in any Consul configuration. However, unless the checklist
|
|
|
|
below is satisfied, Connect is not providing the security guarantees it was
|
|
|
|
built for. The checklist below can be incrementally adopted towards full
|
|
|
|
security if you prefer to operate in less secure models initially.
|
|
|
|
|
|
|
|
~> **Warning**: The checklist below should not be considered exhaustive. Please
|
2022-01-10 23:36:16 +00:00
|
|
|
read and understand the [Consul security model](/docs/security)
|
2018-05-29 21:07:40 +00:00
|
|
|
in depth to assess whether your deployment satisfies the security requirements
|
|
|
|
of Consul.
|
|
|
|
|
|
|
|
## Checklist
|
|
|
|
|
|
|
|
### ACLs Enabled with Default Deny
|
|
|
|
|
|
|
|
Consul must be configured to use ACLs with a default deny policy. This forces
|
|
|
|
all requests to have explicit anonymous access or provide an ACL token. The
|
|
|
|
configuration also forces all service-to-service communication to be explicitly
|
2020-05-29 18:19:16 +00:00
|
|
|
allowed via an allow [intention](/docs/connect/intentions).
|
2018-05-29 21:07:40 +00:00
|
|
|
|
|
|
|
To learn how to enable ACLs, please see the
|
2022-08-26 05:49:29 +00:00
|
|
|
[tutorial on ACLs](/consul/tutorials/security/access-control-setup-production?utm_source=docs).
|
2018-05-29 21:07:40 +00:00
|
|
|
|
|
|
|
**If ACLs are enabled but are in default allow mode**, then services will be
|
|
|
|
able to communicate by default. Additionally, if a proper anonymous token
|
|
|
|
is not configured, this may allow anyone to edit intentions. We do not recommend
|
|
|
|
this. **If ACLs are not enabled**, deny intentions will still be enforced, but anyone
|
|
|
|
may edit intentions. This renders the security of the created intentions
|
|
|
|
effectively useless.
|
|
|
|
|
|
|
|
### TCP and UDP Encryption Enabled
|
|
|
|
|
|
|
|
TCP and UDP encryption must be enabled to prevent plaintext communication
|
|
|
|
between Consul agents. At a minimum, `verify_outgoing` should be enabled
|
|
|
|
to verify server authenticity with each server having a unique TLS certificate.
|
|
|
|
`verify_incoming` provides additional agent verification, but doesn't directly
|
|
|
|
affect Connect since requests must also always contain a valid ACL token.
|
|
|
|
Clients calling Consul APIs should be forced over encrypted connections.
|
|
|
|
|
2022-01-10 23:36:16 +00:00
|
|
|
See the [Consul agent encryption page](/docs/security/encryption) to
|
2018-05-29 21:07:40 +00:00
|
|
|
learn more about configuring agent encryption.
|
|
|
|
|
|
|
|
**If encryption is not enabled**, a malicious actor can sniff network
|
|
|
|
traffic or perform a man-in-the-middle attack to steal ACL tokens, always
|
|
|
|
authorize connections, etc.
|
|
|
|
|
|
|
|
### Prevent Unauthorized Access to the Config and Data Directories
|
|
|
|
|
|
|
|
The configuration and data directories of the Consul agent on both
|
|
|
|
clients and servers should be protected from unauthorized access. This
|
|
|
|
protection must be done outside of Consul via access control systems provided
|
|
|
|
by your target operating system.
|
|
|
|
|
2022-01-10 23:36:16 +00:00
|
|
|
The [full Consul security model](/docs/security) explains the
|
2018-05-29 21:07:40 +00:00
|
|
|
risk of unauthorized access for both client agents and server agents. In
|
|
|
|
general, the blast radius of unauthorized access for client agent directories
|
|
|
|
is much smaller than servers. However, both must be protected against
|
|
|
|
unauthorized access.
|
|
|
|
|
|
|
|
### Prevent Non-Connect Traffic to Services
|
|
|
|
|
|
|
|
For services that are using
|
2020-04-09 23:46:54 +00:00
|
|
|
[proxies](/docs/connect/proxies)
|
|
|
|
(are not [natively integrated](/docs/connect/native)),
|
2018-05-29 21:07:40 +00:00
|
|
|
network access via their unencrypted listeners must be restricted
|
|
|
|
to only the proxy. This requires at a minimum restricting the listener
|
|
|
|
to bind to loopback only. More complex solutions may involve using
|
|
|
|
network namespacing techniques provided by the underlying operating system.
|
|
|
|
|
|
|
|
For scenarios where multiple services are running on the same machine
|
|
|
|
without isolation, these services must all be trusted. We call this the
|
2018-06-25 10:33:07 +00:00
|
|
|
**trusted multi-tenancy** deployment model. Any service could theoretically
|
2018-05-29 21:07:40 +00:00
|
|
|
connect to any other service via the loopback listener, bypassing Connect
|
|
|
|
completely. In this scenario, all services must be trusted _or_ isolation
|
|
|
|
mechanisms must be used.
|
|
|
|
|
|
|
|
For developer or operator access to a service, we recommend
|
|
|
|
using a local Connect proxy. This is documented in the
|
2020-04-09 23:46:54 +00:00
|
|
|
[development and debugging guide](/docs/connect/dev).
|
2018-05-29 21:07:40 +00:00
|
|
|
|
|
|
|
**If non-proxy traffic can communicate with the service**, this traffic
|
|
|
|
will not be encrypted or authorized via Connect.
|
2021-08-13 17:05:29 +00:00
|
|
|
|
|
|
|
### Restrict Access to Envoy's Administration Interface
|
|
|
|
|
|
|
|
Envoy exposes an **unauthenticated**
|
|
|
|
[administration interface](https://www.envoyproxy.io/docs/envoy/latest/operations/admin)
|
|
|
|
that can be used to query and modify the proxy. This interface
|
|
|
|
allows potentially sensitive information to be retrieved, such as:
|
|
|
|
|
|
|
|
* Envoy configuration
|
|
|
|
* TLS certificates
|
|
|
|
* List of upstream services and endpoints
|
|
|
|
|
|
|
|
We **strongly advise** only exposing the administration interface on a loopback
|
|
|
|
address (default configuration) and restricting access to a subset of users.
|
|
|
|
|
|
|
|
**If the administration interface is exposed externally**, for
|
|
|
|
example by specifying a routable [`-admin-bind`](/commands/connect/envoy#admin-bind)
|
|
|
|
address, it may be possible for a malicious actor to gain access to Envoy's
|
|
|
|
configuration, or impact the service's availability within the cluster.
|