Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update TLS configuration #5358

Merged
merged 1 commit into from
Apr 28, 2020

Conversation

praseodym
Copy link
Contributor

What this PR does / why we need it:

Enable TLSv1.3 by default and update list of ciphers. The new configuration matches the 'Intermediate' configuration recommended by the Mozilla SSL Configuration Generator.

Types of changes

New feature (non-breaking change which adds functionality)

How Has This Been Tested?

Tested these settings using the settings ConfigMap.

Checklist:

  • My change requires a change to the documentation.
  • I have updated the documentation accordingly.
  • I've read the CONTRIBUTION guide
  • I have added tests to cover my changes.
  • All new and existing tests passed.

Enable TLSv1.3 by default and update list of ciphers. The new
configuration matches the 'Intermediate' configuration recommended by
the Mozilla SSL Configuration Generator:
https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=modern&openssl=1.1.1d&guideline=5.4
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Apr 13, 2020
@k8s-ci-robot
Copy link
Contributor

Hi @praseodym. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Apr 13, 2020
@praseodym
Copy link
Contributor Author

/assign @bowei

@aledbf
Copy link
Member

aledbf commented Apr 13, 2020

@praseodym please don't assign PRs manually

@aledbf
Copy link
Member

aledbf commented Apr 13, 2020

@praseodym I am not sure about enabling TLSv1.3 by default.

@praseodym
Copy link
Contributor Author

@aledbf

please don't assign PRs manually

Hmm, then maybe k8s-ci-robot should be configured not to suggest assigning reviewers?

I am not sure about enabling TLSv1.3 by default.

With what motivation? Mozilla recommends enabling it by default, Ubuntu's nginx has had it enabled by default since November 2018 and Cloudflare enabled it everywhere in May 2018. I'd say that any issues caused by enabling TLSv1.3 by default should've been resolved by now.

@aledbf
Copy link
Member

aledbf commented Apr 28, 2020

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Apr 28, 2020
@aledbf
Copy link
Member

aledbf commented Apr 28, 2020

/lgtm
/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: aledbf, praseodym

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added lgtm "Looks good to me", indicates that a PR is ready to be merged. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Apr 28, 2020
@k8s-ci-robot k8s-ci-robot merged commit 0d2c6db into kubernetes:master Apr 28, 2020
@praseodym praseodym deleted the update-tls-configuration branch April 28, 2020 16:51
@sslavic
Copy link
Contributor

sslavic commented May 2, 2020

@aledbf did this change actually make it into 0.32.0? I don't see it listed in the changelog https://github.com/kubernetes/ingress-nginx/blob/master/Changelog.md#0320

@sslavic
Copy link
Contributor

sslavic commented May 2, 2020

Also, this PR seems to change documentation only, not default settings in:
https://github.com/kubernetes/ingress-nginx/blob/master/internal/ingress/controller/config/config.go#L67-L73

Is that intentional? Is it even correct to have docs and actual defaults differ?

@praseodym
Copy link
Contributor Author

@sslavic looks like you're right! Not quite sure what happened, I'll submit a followup PR.

@praseodym praseodym mentioned this pull request May 2, 2020
5 tasks
@praseodym
Copy link
Contributor Author

Fix in #5491, thanks for catching this @sslavic!

@sslavic
Copy link
Contributor

sslavic commented May 2, 2020

IIUC, please correct if wrong, this PR:

@praseodym
Copy link
Contributor Author

That's correct. It also changes the set of ciphers for legacy clients in docs to align with the Mozilla SSL Configuration Generator "Old" setting.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants