-
Notifications
You must be signed in to change notification settings - Fork 472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS: require specific TLS version or other configuration for an application #92
Comments
Can we create an overall topic for TLS configuration? (Edit the topic) References:
|
This story is written from application dev standpoint, but I find that mostly TLS policy is enforced by cluster operator level (see https://kubernetes-sigs.github.io/service-apis/concepts/). From conversations w/ users, I have found that app dev do not care as long as someone else makes it compliant/secure. We need to also include mention of enforcement (note such policy can enforced in other ways) if app devs have choice in the matter. |
I can see there could be different stories for dev and cluster operator personas. Cluster operators may define defaults and policy rules. Many dev teams will find the default acceptable, and others will need to specify them. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Similar to #256, this setting can probably be added to /remove-lifecycle stale |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
It is now possible to configure version specific requirement in the |
Yup, let's see how it goes. /close |
@jpeach: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What would you like to be added:
The ability for an application to specify its TLS version requirement. This extends to other TLS tunable such as cipher suites, session caching, session tickets and so forth.
Why is this needed:
As an application developer, my client audience is rapidly moving to TLS 1.2, but the cluster operator is also responsible for applications that will require TLS 1.1 for a long time to come. I want to be able to require TLS 1.2 on my application while allowing other applications to continue with TLS 1.1 for compatibility reasons.
The same use case applies to other TLS configuration items in general. Note that some applications will make different security/performance tradeoffs (e.g. around session tickets) so it would be inappropriate for the policy for my application to be allowed to be used for a different application.
/kind user-story
The text was updated successfully, but these errors were encountered: