I dont find the CA private key of the transport layer that has been generated by Elasticsearch at first start.
I can find the CA private key of the http layer its in the generated http.p12 file, I would expect the similar private key in transport.p12, but its not there:
root@elk-test:/# openssl pkcs12 -info -in /etc/elasticsearch/certs/http.p12 | grep "Bag\|bag\|friendlyName\|subject\|issuer\|---"
Enter Import Password:
MAC: sha256, Iteration 10000
MAC length: 32, salt length: 20
PKCS7 Data
Shrouded Keybag: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
Shrouded Keybag: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
PKCS7 Encrypted data: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256
Bag Attributes
friendlyName: http_ca
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
Bag Attributes
friendlyName: http
-----BEGIN ENCRYPTED PRIVATE KEY-----
Certificate bag
Certificate bag
Certificate bag
-----END ENCRYPTED PRIVATE KEY-----
Bag Attributes
friendlyName: http_ca
subject=CN = Elasticsearch security auto-configuration HTTP CA
issuer=CN = Elasticsearch security auto-configuration HTTP CA
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Bag Attributes
friendlyName: http
subject=CN = elk-test
issuer=CN = Elasticsearch security auto-configuration HTTP CA
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Bag Attributes
friendlyName: CN=Elasticsearch security auto-configuration HTTP CA
subject=CN = Elasticsearch security auto-configuration HTTP CA
issuer=CN = Elasticsearch security auto-configuration HTTP CA
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
type or paste code here
in transport.p12 the private key for CA is missing:
root@elk-test:/# openssl pkcs12 -info -in /etc/elasticsearch/certs/transport.p12 | grep "Bag\|bag\|friendlyName\|subject\|issuer\|---"
Enter Import Password:
MAC: sha256, Iteration 10000
MAC length: 32, salt length: 20
PKCS7 Data
Shrouded Keybag: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
PKCS7 Encrypted data: PBES2, PBKDF2, AES-256-CBC, Iteration 10000, PRF hmacWithSHA256
Certificate bag
Certificate bag
Bag Attributes
friendlyName: transport
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
Bag Attributes
friendlyName: transport
subject=CN = elk-test
issuer=CN = Elasticsearch security auto-configuration HTTP CA
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Bag Attributes
friendlyName: transport_ca
subject=CN = Elasticsearch security auto-configuration HTTP CA
issuer=CN = Elasticsearch security auto-configuration HTTP CA
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Is it a bug or the transport layer CA has its private key somewhere else?