If you are unable to install stunnel, try disabling certificate hostname checking. Additionally, provide the strongest security possible by enabling Online Certificate Status Protocol (OCSP).
Disabling Certificate Hostname Checking
If you are unable to install the required dependencies, you can optionally disable certificate hostname checking inside the Amazon EFS mount helper configuration. We do not recommend that you disable this feature in production environments. To disable certificate host name checking, do the following:
-
Using your text editor of choice, open the
/etc/amazon/efs/efs-utils.conf
file. -
Set the
stunnel_check_cert_hostname
value to false. -
Save the changes to the file and close it.
For more information on using encryption of data in transit, see Mounting EFS file systems.
Enabling Online Certificate Status Protocol
In order to maximize file system availability in the event that the CA is not reachable
from your VPC, the Online Certificate Status Protocol (OCSP) is not enabled by default when you
choose to encrypt data in transit. Amazon EFS uses an Amazon certificate authority
In order to provide the strongest security possible, you can enable OCSP so that your Linux clients can check for revoked certificates. OCSP protects against malicious use of revoked certificates, which is unlikely to occur within your VPC. In the event that an EFS TLS certificate is revoked, Amazon publishes a security bulletin and release a new version of EFS mount helper that rejects the revoked certificate.
To enable OCSP on your Linux client for all future TLS connections to EFS
-
Open a terminal on your Linux client.
-
Using your text editor of choice, open the
/etc/amazon/efs/efs-utils.conf
file. -
Set the
stunnel_check_cert_validity
value to true. -
Save the changes to the file and close it.
To enable OCSP as part of the mount
command
-
Use the following mount command to enable OCSP when mounting the file system.
$
sudo mount -t efs -o tls,ocspfs-12345678
:/ /mnt/efs