Marketplace
mtls-service-mesh
Use when implementing service-to-service security, mTLS, or service mesh patterns. Covers mutual TLS, Istio, Linkerd, certificate management, and service mesh security configurations.
allowed_tools: Read, Glob, Grep
$ Installieren
git clone https://github.com/melodic-software/claude-code-plugins /tmp/claude-code-plugins && cp -r /tmp/claude-code-plugins/plugins/systems-design/skills/mtls-service-mesh ~/.claude/skills/claude-code-plugins// tip: Run this command in your terminal to install the skill
SKILL.md
name: mtls-service-mesh description: Use when implementing service-to-service security, mTLS, or service mesh patterns. Covers mutual TLS, Istio, Linkerd, certificate management, and service mesh security configurations. allowed-tools: Read, Glob, Grep
mTLS and Service Mesh Security
Comprehensive guide to securing service-to-service communication with mutual TLS and service mesh patterns.
When to Use This Skill
- Implementing mTLS between services
- Deploying service mesh (Istio, Linkerd)
- Certificate management for services
- Zero trust networking within clusters
- Service identity and authentication
- Encrypting east-west traffic
Mutual TLS (mTLS) Fundamentals
TLS vs mTLS
Standard TLS (one-way):
Client โโโโโโโโโโโโโโโโโโโบ Server
Client verifies
server identity
Mutual TLS (two-way):
Client โโโโโโโโโโโโโโโโโโบ Server
Both verify
each other
Standard TLS:
- Server presents certificate
- Client validates server
- Client remains anonymous to server
Mutual TLS:
- Server presents certificate
- Client validates server
- Client presents certificate
- Server validates client
- Both identities verified
mTLS Handshake
mTLS Handshake Flow:
1. Client Hello
โโโ Client โ Server: "Hello, I support these ciphers"
2. Server Hello + Certificate
โโโ Server โ Client: "Let's use this cipher"
โโโ Server โ Client: "Here's my certificate"
โโโ Server โ Client: "Please provide your certificate"
3. Client Certificate
โโโ Client โ Server: "Here's my certificate"
4. Certificate Verification
โโโ Both sides verify:
- Certificate chain valid
- Not expired
- Not revoked
- Identity matches expected
5. Key Exchange
โโโ Derive shared session key
6. Encrypted Communication
โโโ All traffic encrypted with session key
Certificate Components
Service Certificate Fields:
Subject:
CN = my-service
O = my-organization
Subject Alternative Names (SANs):
- DNS: my-service.default.svc.cluster.local
- DNS: my-service.default
- DNS: my-service
- URI: spiffe://cluster.local/ns/default/sa/my-service
Issuer: (CA that signed the certificate)
CN = cluster-ca
Validity:
Not Before: 2025-01-01
Not After: 2025-01-08 (short-lived, auto-rotated)
Key Usage:
- Digital Signature
- Key Encipherment
Extended Key Usage:
- TLS Web Server Authentication
- TLS Web Client Authentication
Service Mesh Architecture
Components
Service Mesh Architecture:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Control Plane โ
โ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โ
โ โ Pilot โ โ Citadel โ โ Galley โ โ
โ โ (Config) โ โ (CA) โ โ (Validation)โ โ
โ โโโโโโโฌโโโโโโโ โโโโโโโฌโโโโโโโ โโโโโโโฌโโโโโโโ โ
โโโโโโโโโโผโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโผโโโโโโโโโโโโ
โ โ โ
โโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโ
โ Data Plane โ
โโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโ
โ โ โ โ
โ โโโโโโโผโโโโโโ โโโโโโโโผโโโโโโ โ
โ โ Sidecar โโโโโโโmTLSโโโโโโโโบโ Sidecar โ โ
โ โ (Envoy) โ โ (Envoy) โ โ
โ โโโโโโโฌโโโโโโ โโโโโโโฌโโโโโโโ โ
โ โ โ โ
โ โโโโโโโผโโโโโโ โโโโโโโผโโโโโโ โ
โ โ Service A โ โ Service B โ โ
โ โโโโโโโโโโโโโ โโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Control Plane Functions:
- Certificate authority (issue/rotate certs)
- Configuration distribution
- Policy management
- Service discovery
Data Plane Functions:
- mTLS termination
- Traffic encryption
- Policy enforcement
- Telemetry collection
Sidecar Proxy Pattern
Sidecar Injection:
Without Sidecar:
โโโโโโโโโโโโโโโโโโโโโ
โ Pod โ
โ โโโโโโโโโโโโโโโ โ
โ โ App โโโโโโโโบ Network
โ โโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโ
With Sidecar:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Pod โ
โ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โ
โ โ App โ โ Sidecar โ โ
โ โ โโโโบโ (Envoy) โโโโโโโโบ mTLS โโโบ
โ โ localhost โ โ handles โ โ
โ โ :8080 โ โ security โ โ
โ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Traffic Flow:
1. App sends request to localhost
2. Sidecar intercepts (iptables rules)
3. Sidecar establishes mTLS connection
4. Traffic encrypted to destination sidecar
5. Destination sidecar decrypts
6. Destination sidecar forwards to app
Istio Security
Istio mTLS Modes
PeerAuthentication Modes:
1. PERMISSIVE (default initially)
- Accepts both plaintext and mTLS
- Good for migration
2. STRICT
- mTLS required for all traffic
- Rejects plaintext connections
3. DISABLE
- Disable mTLS (not recommended)
Example Policy:
apiVersion: security.istio.io/v1beta1
kind: PeerAuthentication
metadata:
name: default
namespace: production
spec:
mtls:
mode: STRICT
Istio Authorization Policies
Authorization Policy Structure:
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
name: orders-policy
namespace: production
spec:
selector:
matchLabels:
app: orders-service
action: ALLOW
rules:
- from:
- source:
principals: ["cluster.local/ns/production/sa/frontend"]
to:
- operation:
methods: ["GET", "POST"]
paths: ["/api/orders/*"]
when:
- key: request.headers[x-custom-header]
values: ["valid-value"]
Policy Logic:
- selector: Which workloads this applies to
- from: Who can make requests (source identity)
- to: What operations are allowed
- when: Additional conditions
Istio Certificate Management
Istio Certificate Flow:
1. Workload starts with sidecar
2. Sidecar requests certificate from Istiod (CA)
3. Istiod verifies service account identity
4. Istiod issues short-lived certificate (24h default)
5. Sidecar stores certificate in memory
6. Certificate auto-rotated before expiry
SPIFFE Identity Format:
spiffe://cluster.local/ns/namespace/sa/service-account
Certificate Properties:
- Short-lived (hours, not years)
- Auto-rotated (no manual intervention)
- Bound to Kubernetes service account
- No private key leaves workload
Linkerd Security
Linkerd mTLS
Linkerd Automatic mTLS:
Features:
- mTLS enabled by default
- Zero-configuration setup
- Automatic certificate rotation
- No YAML required for basic mTLS
Identity System:
- Uses Kubernetes service accounts
- Certificates issued by Linkerd's identity service
- 24-hour certificate lifetime (default)
- Automatic rotation
Verification:
$ linkerd viz tap deploy/my-service
Shows mTLS status of connections
$ linkerd check --proxy
Validates mTLS configuration
Linkerd Server Authorization
Linkerd Authorization:
apiVersion: policy.linkerd.io/v1beta1
kind: Server
metadata:
name: orders-api
namespace: production
spec:
podSelector:
matchLabels:
app: orders-service
port: 8080
proxyProtocol: HTTP/2
---
apiVersion: policy.linkerd.io/v1beta1
kind: ServerAuthorization
metadata:
name: orders-authz
namespace: production
spec:
server:
name: orders-api
client:
meshTLS:
serviceAccounts:
- name: frontend
namespace: production
Certificate Management
Certificate Rotation Strategies
Rotation Approaches:
1. Short-Lived Certificates (Recommended)
- 1-24 hour validity
- Auto-rotated by mesh
- No revocation needed (just let expire)
- Service mesh handles automatically
2. Long-Lived with Revocation
- Days to months validity
- Requires revocation infrastructure
- CRL or OCSP for checking
- More complex to manage
3. Hybrid
- Short-lived for service mesh
- Longer-lived for external connections
- Different approaches for different contexts
Rotation Timeline:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Certificate Lifetime (e.g., 24 hours) โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโค
โ Issue Rotate Expire โ
โ t=0 t=12h t=24h โ
โ (50% of life) โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Root CA Management
Root CA Hierarchy:
Option 1: Single Root (Simple)
Root CA
โโโ Workload Certificates
Option 2: Intermediate CAs (Recommended)
Root CA (offline, very long-lived)
โโโ Cluster CA 1 (intermediate, medium-lived)
โ โโโ Workload Certs (short-lived)
โโโ Cluster CA 2
โ โโโ Workload Certs
โโโ Cluster CA 3
โโโ Workload Certs
Root CA Rotation:
1. Generate new root CA
2. Update trust bundle (include both old and new)
3. Issue new intermediates from new root
4. Workloads accept certs from both roots
5. Remove old root after all certs rotated
Migration to mTLS
Migration Strategy
Phase 1: Observe (Week 1-2)
- Enable mesh in permissive mode
- Monitor which connections are plaintext
- Identify all service-to-service traffic
- Document dependencies
Phase 2: Test (Week 3-4)
- Enable strict mode in test environment
- Verify all services can communicate
- Test failure scenarios
- Fix any issues
Phase 3: Rollout (Week 5-8)
- Enable strict mode namespace by namespace
- Start with least critical namespaces
- Monitor for connection failures
- Rollback plan ready
Phase 4: Enforce (Week 9+)
- Enable strict mode cluster-wide
- Remove permissive policies
- Document exceptions
- Ongoing monitoring
Common Migration Issues
Issue: External services can't connect
Fix: Use Gateway for external โ internal traffic
Issue: Legacy services don't support mTLS
Fix: Use permissive mode for specific services
Issue: Performance degradation
Fix: Tune sidecar resources, connection pools
Issue: Certificate errors
Fix: Check trust bundle, certificate chain
Issue: Non-meshed services can't communicate
Fix: Either add to mesh or use permissive mode
Best Practices
Security Best Practices:
1. Certificate Management
โก Use short-lived certificates (hours, not years)
โก Automate rotation completely
โก Protect root CA (offline if possible)
โก Monitor certificate expiry
2. Policy Management
โก Default deny, explicit allow
โก Use namespace isolation
โก Regular policy audits
โก Test policies in staging first
3. Observability
โก Monitor mTLS success/failure rates
โก Alert on plaintext connections (in strict mode)
โก Log authorization decisions
โก Trace requests across services
4. Operations
โก Document all exceptions
โก Regular security reviews
โก Incident response procedures
โก Rotation runbooks
5. Performance
โก Right-size sidecar resources
โก Connection pooling
โก Monitor latency overhead
โก Benchmark with and without mesh
Troubleshooting
Common Issues:
1. "Connection reset" errors
- Check if both sides have valid certs
- Verify trust bundle is synchronized
- Check for certificate expiry
2. "503 Service Unavailable"
- Destination may not have sidecar
- Authorization policy blocking request
- Service not in mesh
3. High latency
- Sidecar resource constraints
- Certificate verification overhead
- Network policy conflicts
4. Intermittent failures
- Certificate rotation race condition
- Trust bundle propagation delay
- Sidecar restart during rotation
Debug Commands (Istio):
$ istioctl analyze
$ istioctl proxy-status
$ istioctl proxy-config secret <pod>
Debug Commands (Linkerd):
$ linkerd check
$ linkerd viz tap <resource>
$ linkerd viz stat <resource>
Related Skills
zero-trust-architecture- Overall security architectureapi-security- Application-level securitycontainer-orchestration- Kubernetes and service meshdistributed-tracing- Observability in service mesh
Repository

melodic-software
Author
melodic-software/claude-code-plugins/plugins/systems-design/skills/mtls-service-mesh
3
Stars
0
Forks
Updated4d ago
Added1w ago