server cert compromised. tls: handshake message of length 70096 bytes exceeds maximum of 65536 bytes #7420
-
|
Today one of my k3s cluster control planes started throwing Running Is there a way to alter the SANs without access to the server? See below for current SANs |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 6 replies
-
|
To reset the SANs, you can use There is not currently any way to filter the CNs that are added to the cert; but there is a way to prevent additional certs from being added once you're happy with what it has on it - see the discussion at #7312 (comment) |
Beta Was this translation helpful? Give feedback.
-
|
Facing this issue, I am unable to clean up the stuffed entries. Whenever I delete the k3s-serving secret, it gets recreated immediately, and also regenerates the dynamic-cert.json. I've tried deleting them in various orders, but the stuffed sans keep reappearing. Is there a way to work around this? |
Beta Was this translation helpful? Give feedback.
Tried deleting the secret from etcd as well - no dice
I do have S3 etcd backups I could attempt to recreate the cluster and restore the snapshot, but I didn't have any luck last time attempted.