I am using the following YAML file on controller.
On bringing up the controller I notice that on all 3 ports (8440, 8441, 8444) the certificate used is the one that is specified in the outermost identity section. I have double-checked that the certificates are indeed different.
$ ./bin/ziti --version
v1.1.7
v: 3
db: db/ctrl.db
identity:
cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-client-20240806152549.cert
server_cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8440-20240806152549.chain.pem
key: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/keys/ebea685ad01d442a8515a4f1329d2b8d-server-8440-20240806152549.key
ca: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549.chain.pem
ctrl:
listener: tls:192.168.160.10:8440
edge:
api:
address: 192.168.150.10:8441
enrollment:
signingCert:
cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549.cert
key: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/keys/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549.key
edgeIdentity:
duration: 60m
edgeRouter:
duration: 60m
web:
- name: edge-client-api
bindPoints:
- interface: ebea685ad01d442a8515a4f1329d2b8d.pub.zitipoc.com:8441
address: 192.168.150.10:8441
identity:
cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-client-20240806152549.cert
server_cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8441-20240806152549.chain.pem
key: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/keys/ebea685ad01d442a8515a4f1329d2b8d-server-8441-20240806152549.key
ca: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549.chain.pem
apis:
- binding: edge-client
- name: edge-mgmt-api
bindPoints:
- interface: ebea685ad01d442a8515a4f1329d2b8d.mgmt.zitipoc.com:8444
address: 192.168.170.10:8444
identity:
cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-client-20240806152549.cert
server_cert: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8444-20240806152549.chain.pem
key: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/keys/ebea685ad01d442a8515a4f1329d2b8d-server-8444-20240806152549.key
ca: pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549.chain.pem
apis:
- binding: fabric
- binding: edge-management
- binding: health-checks
Certificates:
$ openssl x509 -text -in pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8441-20240806152549.chain.pem | grep -i 'Subje
ct:'
Subject: C = US, L = IAD, O = OCI, OU = ZTA-POC, CN = ebea685ad01d442a8515a4f1329d2b8d.pub.zitipoc.com
$ openssl x509 -text -in pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8440-20240806152549.chain.pem | grep -i 'Subje
ct:'
Subject: C = US, L = IAD, O = OCI, OU = ZTA-POC, CN = ebea685ad01d442a8515a4f1329d2b8d.priv.zitipoc.com
$ openssl x509 -text -in pki/ebea685ad01d442a8515a4f1329d2b8d-signing-ca-20240806152549/certs/ebea685ad01d442a8515a4f1329d2b8d-server-8444-20240806152549.chain.pem | grep -i 'Subje
ct:'
Subject: C = US, L = IAD, O = OCI, OU = ZTA-POC, CN = ebea685ad01d442a8515a4f1329d2b8d.mgmt.zitipoc.com
And on the host:
$ openssl s_client -connect ebea685ad01d442a8515a4f1329d2b8d.pub.zitipoc.com:8441 </dev/null 2>/dev/null | openssl x509 -text| grep 'Subject:'
Subject: C = US, L = IAD, O = OCI, OU = ZTA-POC, CN = ebea685ad01d442a8515a4f1329d2b8d.priv.zitipoc.com
$ openssl s_client -connect ebea685ad01d442a8515a4f1329d2b8d.mgmt.zitipoc.com:8444 </dev/null 2>/dev/null | openssl x509 -text| grep 'Subject:'
Subject: C = US, L = IAD, O = OCI, OU = ZTA-POC, CN = ebea685ad01d442a8515a4f1329d2b8d.priv.zitipoc.com