-
Notifications
You must be signed in to change notification settings - Fork 222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove insecure tls parameters or make them configurable #698
Comments
The HTTPS server should only be allowing a minimum of TLS 1.2, have you been able to verify that it's allowing 1.0 and 1.1? Line 107 in bed7323
trident/frontend/rest/apiserver_https.go Line 37 in bed7323
|
Additionally, the node pods should only be opening a port on |
it seems to be open on all of our nodes, so it seems to be attached to the daemonset.
And i can connect to it using TLS1.0 (the strange openssl path comes from my default openssl lib not supporting the required ciphers anymore)
I was quite confused as i saw the TLS1.2 configuration as well and i'm now not sure where this comes from |
So the port number being different seems to be coming from your DaemonSet settings. It's giving the following option to the trident binary I'll change this to a bug and track it so we can try to reproduce. Are you by any chance able to try upgrading to the latest trident to see if it has the same issue? |
Thanks for the suggesstion. However the cbc ciphers are still supported:
|
Thanks for verifying with the latest version. I'll have the team look into disabling the obsolete ciphers as well. Do keep in mind though that this port is only used for liveness and readiness probes so there's not really any sensitive info available on this port. |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA is flagged as non-secure from Tenable's Nessus, perhaps others. Any plans to drop it from code? |
Hi @flngen, There isn't anything in the Trident code that specifically uses that cipher. We bumped the minimum server TLS version to 1.3 as you can see in the above referenced commit. You can find more information about what ciphers are included for specific TLS versions in Go in the crypto package documentation. |
Describe the solution you'd like
We are currently running trident in a kubernetes cluster as a csi provisioner (installed using
tridentctl
).Each of the pods of the trident daemonset is listening on port
34572
for https requests. This https session does however support outdated versions/ciphers. In particular:It is however not possible to change the supported ciphers via configuration. Could trident be adjusted so that either the cipher/tls version list is configurable; or that only secure ciphers/tls versions are choosen?
Describe alternatives you've considered
None: supporting TLS 1.0 and 1.1 is not something that is needed
Additional context
Currently used version is
netapp/trident:21.04.0
The text was updated successfully, but these errors were encountered: