-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Weak cipher suites supported on calico-typha #7881
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Adding a new weak ciphers to the list that Calico typha supports in its default configuration: |
Any options available to remove this growing list of weak ciphers to protect network comms? |
These TLS1.2 3DES cyphers are also now considered to be weak:
|
This falls under "CWE-326: Inadequate Encryption Strength" and "CWE-310: Cryptographic Issues". There are existing CVE's in other products for the same reasons. Wouldn't it be prudent to allow customers disable the weak ciphers before a CVE is assigned to calico-typha? |
Wouldn't it be possible to also remove |
FWIW, we are hearing that different organisations have different requirements for TLS ciphers - there is no "one size fits all", so a hard-coded solution isn't suitable. With that in mind, some work is currently going on to make the ciphers list configurable. tagging @lucastigera |
When the TLS endpoint that calico-typha exposes, the following ciphers are advertised as supported which are considered weak as they do not offer PFS (Perfect Forward Secrecy).
Expected Behavior
Only Ephemeral suites should be used
Current Behavior
These suites are supported by the server:
Possible Solution
PR to remove the 2x weak ciphers.
Steps to Reproduce (for bugs)
The text was updated successfully, but these errors were encountered: