Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cli, security: add support for configurable TLS cipher suites #137663

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

souravcrl
Copy link
Contributor

@souravcrl souravcrl commented Dec 18, 2024

cli, security: add support for configurable TLS cipher suites

fixes #136999
Epic CRDB-45351

Release Note(security,ops): We will be providing a new cockroach start command
cli flag tls-cipher-suites which is a string of comma separated list of cipher
suites to be used for all incoming TLS connections to the node. For TLS 1.2,
this should strictly be a subset of suites defined in
security/tls_ciphersuites.go as RecommendedCipherSuites or OldCipherSuites. For
TLS 1.3, this should be configured to a subset of ciphers in
crypto/tls/cipher_suites.go. The flag will restrict TLS connections to the node
for all 3 types of connection(i.e. sql, rpc, http) where node acts as the server
for the connections and close non-conforming ones.

@souravcrl souravcrl added the do-not-merge bors won't merge a PR with this label. label Dec 18, 2024
@souravcrl souravcrl self-assigned this Dec 18, 2024
Copy link

blathers-crl bot commented Dec 18, 2024

It looks like your PR touches production code but doesn't add or edit any test code. Did you consider adding tests to your PR?

🦉 Hoot! I am a Blathers, a bot for CockroachDB. My owner is dev-inf.

@cockroach-teamcity
Copy link
Member

This change is Reviewable

@souravcrl souravcrl force-pushed the configure-tls-ciphers branch from 50f89cd to 510ac96 Compare December 19, 2024 10:34
@souravcrl souravcrl force-pushed the configure-tls-ciphers branch 3 times, most recently from e6e74d4 to e7ff003 Compare December 20, 2024 08:29
@souravcrl souravcrl force-pushed the configure-tls-ciphers branch from e7ff003 to 989aa5a Compare January 9, 2025 05:01
@souravcrl souravcrl marked this pull request as ready for review January 9, 2025 05:02
@souravcrl souravcrl requested a review from a team January 9, 2025 05:02
@souravcrl souravcrl requested a review from a team as a code owner January 9, 2025 05:02
@souravcrl souravcrl requested a review from a team January 9, 2025 05:02
@souravcrl souravcrl requested review from a team as code owners January 9, 2025 05:02
@souravcrl souravcrl changed the title [WIP] cli, security: add support for configurable TLS cipher suites cli, security: add support for configurable TLS cipher suites Jan 9, 2025
Copy link
Contributor

@pritesh-lahoti pritesh-lahoti left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed 10 of 10 files at r1, 9 of 9 files at r2, all commit messages.
Reviewable status: :shipit: complete! 0 of 0 LGTMs obtained (waiting on @cthumuluru-crdb)

@souravcrl souravcrl added backport-24.1.x Flags PRs that need to be backported to 24.1. backport-24.2.x backport-24.3.x Flags PRs that need to be backported to 24.3 and removed do-not-merge bors won't merge a PR with this label. labels Jan 9, 2025
@souravcrl souravcrl force-pushed the configure-tls-ciphers branch 6 times, most recently from 338f9b3 to ef69b20 Compare January 10, 2025 03:30
fixes cockroachdb#136999
Epic CRDB-45351

Release Note(security,ops): We will be providing a new cockroach start command
cli flag `tls-cipher-suites` which is a string of comma separated list of cipher
suites to be used for all incoming TLS connections to the node. For TLS 1.2,
this should strictly be a subset of suites defined in
security/tls_ciphersuites.go as RecommendedCipherSuites or OldCipherSuites. For
TLS 1.3, this should be configured to a subset of ciphers in
crypto/tls/cipher_suites.go. The flag will restrict TLS connections to the node
for all 3 types of connection(i.e. sql, rpc, http) where node acts as the server
for the connections and close non-conforming ones.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport-24.1.x Flags PRs that need to be backported to 24.1. backport-24.3.x Flags PRs that need to be backported to 24.3
Projects
None yet
Development

Successfully merging this pull request may close these issues.

security: support tls configurable cipher suites
4 participants