-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow admin user to further limit TLS ciphers used for TLS1.2 client requests and server ports (not including CLI) #1952
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1952 +/- ##
==========================================
+ Coverage 30.59% 30.68% +0.09%
==========================================
Files 363 365 +2
Lines 60516 60617 +101
==========================================
+ Hits 18513 18602 +89
- Misses 41469 41479 +10
- Partials 534 536 +2 ☔ View full report in Codecov by Sentry. |
8edfa60
to
afd742e
Compare
Does this new configuration option allow the user to constrain the ciphers so much that everything stops working? For example, if they only allow one cipher, and that cipher is not an elliptic curve cipher, then will that break everything (because all of our auto-generated TLS certs use EC)? |
This is a good point. Something outside of the Pinniped code ultimately decides which ciphers to use that even further constrain the user-allowed list. At the moment this would not impede application startup but the endpoints would never complete a TLS handshake. This needs more thought. |
What if we reserved at least one elliptic cipher for Pinniped use? That way at least the healthcheck would work. If the user has provided incompatible certificates and cipher suites there's not much we can do about that. Another option is we require at least one elliptic and one RSA cipher? |
1dc7b20
to
3fde006
Compare
3fde006
to
936dd20
Compare
a94a614
to
91b39cb
Compare
91b39cb
to
bd1650b
Compare
We discussed on a call and I think we decided that the documentation for the new option is sufficient. We cannot know what combination of cipher will work because it is outside our control, for example we don't know how the Kubernetes API server's ciphers were configured. |
Co-authored-by: Joshua Casey <joshuatcasey@gmail.com>
bd1650b
to
be8d3f2
Compare
be8d3f2
to
e1b0526
Compare
Co-authored-by: Joshua Casey <joshuatcasey@gmail.com>
e1b0526
to
f7f32f2
Compare
Limit TLS ciphers for tls1.2.
Fixes #1605.
Replaces #1927.