Am 29.06.23 um 16:56 schrieb Eric Graham:
My deployments have a single CA that's used as trust-anchor on both machines, and then the certificates are signed by the CA. The CA is further added to the systems' trust stores. I haven't tried what you're doing (sorry).

I decided to set up a small local CA and generate 2 server certs with it.

Imported the CA to the debian keystore as well.

I have a working communication now between the kea-dhcp4-daemons using these TLS-certs: great.

-> the DHCP-cluster works


But my setup with the stork-agents and the stork-server is broken now.

The agents seem to contact the kea-control-agents by IP, so the certs (which don't contain IP SANs according to the ugly error messages) don't match.

* Do I have to put anything into: /var/lib/stork-agent/certs ?

* I set (in /etc/stork/agent.env):

STORK_AGENT_SKIP_TLS_CERT_VERIFICATION=true

doesn't help.

* I tried in /etc/kea/kea-ctrl-agent.conf:

"cert-required": false

A bit lost currently, sorry.



--
ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.

To unsubscribe visit https://lists.isc.org/mailman/listinfo/kea-users.

Kea-users mailing list
Kea-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/kea-users

Reply via email to