[
https://issues.apache.org/jira/browse/NIFI-5399?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16539049#comment-16539049
]
ASF GitHub Bot commented on NIFI-5399:
--------------------------------------
Github user alopresto commented on a diff in the pull request:
https://github.com/apache/nifi/pull/2870#discussion_r201442432
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -164,6 +164,16 @@ accomplished by setting the `nifi.remote.input.secure`
and `nifi.cluster.protoco
In order to facilitate the secure setup of NiFi, you can use the
`tls-toolkit` command line utility to automatically generate the required
keystores, truststore, and relevant configuration files. This is especially
useful for securing multiple NiFi nodes, which can be a tedious and error-prone
process.
+Wildcard certificates (i.e. two nodes `node1.nifi.apache.org` and
`node2.nifi.apache.org` being assigned the same certificate with a CN or SAN
entry of +*.nifi.apache.org+) are *not officially supported* and *not
recommended*. There are numerous disadvantages to using wildcard certificates,
and a cluster working with wildcard certificates has occurred in previous
versions out of lucky accidents, not intentional support.
--- End diff --
Having a SAN entry with a wildcard value is perfectly acceptable *IF* there
is another SAN with a unique value and the DN is unique. Older advice would
have just been to provide a unique DN, but with the way Google Chrome and other
tools are changing to come inline with [RFC
6125](https://tools.ietf.org/html/rfc6125#section-6.4.4), DN is no longer a
preferred definitive provider for the CN. It is supposed to be used only as a
last resort if SAN is missing. I have filed a Jira
[NIFI-5398](https://issues.apache.org/jira/browse/NIFI-5398) to improve NiFi's
handling of this situation as well.
> Improve documentation to indicate that wildcard certificates are not
> recommended for cluster communications
> -----------------------------------------------------------------------------------------------------------
>
> Key: NIFI-5399
> URL: https://issues.apache.org/jira/browse/NIFI-5399
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Documentation & Website
> Affects Versions: 1.7.0
> Reporter: Andy LoPresto
> Assignee: Andy LoPresto
> Priority: Major
> Labels: certificate, cluster, documentation, security, tls
>
> Based on the research from NIFI-5370 and potential changes in NIFI-5398, the
> Admin Guide should be improved to explain why wildcard certificates without a
> unique SAN are not recommended for secure cluster configurations.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)