Skip to content
Discussion options

You must be logged in to vote

If a malicious actor got access to admin-level talosconfig, they effectively have control over the cluster, it's no different than leaking root password on a traditional UNIX system.

So yes, they can rotate the CA before you have access to the cluster locking you out, or they could try to stay undetected.

CA rotation ensures that whoever had talosconfig in the past, they can't access Talos API anymore.

A better option is to use Omni which never exposes client certificates to the user and acts as an authentication proxy which is tied into the identity provider e.g. via SAML. This problem doesn't exist with Omni.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by peter-facko
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants