-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configurable TLS cipher suites and versions; disallow weak ciphers #4269
Conversation
0bf2f50
to
eb587d6
Compare
disallow 3DES and RC4 ciphers add documentation for tls_cipher_suites
eb587d6
to
c1b56aa
Compare
c1b56aa
to
509180e
Compare
nomad/server.go
Outdated
tlsConf := tlsutil.NewTLSConfiguration(newTLSConfig) | ||
tlsConf, err := tlsutil.NewTLSConfiguration(newTLSConfig) | ||
if err != nil { | ||
return err |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If the error is logged by the caller we should log here
|
||
- `tls_min_version` - Specifies the minimum supported version of TLS. Accepted | ||
values are "tls10", "tls11", "tls12". Defaults to TLS 1.2. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Any reason we aren't also exposing: https://www.consul.io/docs/agent/options.html#tls_prefer_server_cipher_suites
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wanted to keep the PR minimal to make reviewing simpler, I could add this in a follow up PR.
I'm going to lock this pull request because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active contributions. |
By default, TLS 1.2 and a subset of safe ciphers are allowed. If operators want to enable TLS 1.0 and unsafe ciphers, this can be done via the agent configuration.