Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MAISTRA-2124: Ssl: avoid tracking "unknown" ciphers #69

Merged
merged 3 commits into from
Feb 10, 2021

Conversation

oschaaf
Copy link
Contributor

@oschaaf oschaaf commented Feb 8, 2021

Track ssl.ciphers.xxx counters by cipher name instead of ssl.ciphers.unknown where possible.
Inspired by envoyproxy/envoy#14534

Jira issue: https://issues.redhat.com/browse/MAISTRA-2124

Signed-off-by: Otto van der Schaaf [email protected]

Try to track the ssl.ciphers.xxx counters by cipher name instead of
ssl.ciphers.unknown where possible.

Signed-off-by: Otto van der Schaaf <[email protected]>
@dmitri-d
Copy link
Contributor

dmitri-d commented Feb 8, 2021

This looks good, tyvm @oschaaf. There's a failure in a fuzz test (that I thought I disabled), please ignore it. The other failure is in SslSocketTest.CipherUsageGetsCounted test: C++ exception with description "Failed to initialize cipher suites AEAD-AES128-GCM-SHA256. The following ciphers were rejected when tried individually: AEAD-AES128-GCM-SHA256" thrown in the test body.

@dmitri-d
Copy link
Contributor

dmitri-d commented Feb 8, 2021

@oschaaf: could you also create a ticket (here: https://issues.redhat.com/projects/MAISTRA/issues) and update the commit message to include it?

@oschaaf
Copy link
Contributor Author

oschaaf commented Feb 8, 2021

Thanks. I'm stripping out "AEAD-AES128-GCM-SHA256" and am trying to find out if there's others that would cause similar failures, by running that test via docker with the build image. I'll push an amendment once I get that to pass.

@oschaaf
Copy link
Contributor Author

oschaaf commented Feb 9, 2021

@dmitri-d

  • Merged the latest into this branch, which I hope makes tests pass.
  • Filed https://issues.redhat.com/browse/MAISTRA-2124
  • Updated the PR description to reference that Jira issue. There are multiple commits, do we squash commits here upon merge?

@jwendell
Copy link
Member

jwendell commented Feb 9, 2021

@oschaaf Is this an openssl specific thing? Or it applies to upstream as well?

@oschaaf
Copy link
Contributor Author

oschaaf commented Feb 9, 2021

@oschaaf Is this an openssl specific thing? Or it applies to upstream as well?

The test is specific to pass for the openssl we use; the change itself is on par with what upstream has today on master.

@jwendell
Copy link
Member

jwendell commented Feb 9, 2021

Is this critical to have in our fork? Or it;s just safe to wait for the next version, when we will grab the next Envoy version?

@oschaaf
Copy link
Contributor Author

oschaaf commented Feb 9, 2021

Is this critical to have in our fork? Or it;s just safe to wait for the next version, when we will grab the next Envoy version?

Well, the change allows one to observe which ciphers effectively get used when looking at the stats. I wouldn't call it critical to operation, but it there are times when that is useful.

@dmitri-d
Copy link
Contributor

dmitri-d commented Feb 9, 2021

@jwendell: I'm ok with getting this merged.

@jwendell jwendell changed the title Ssl: avoid tracking "unknown" ciphers MAISTRA-2124: Ssl: avoid tracking "unknown" ciphers Feb 9, 2021
@maistra-bot maistra-bot merged commit d644eb8 into maistra:maistra-2.1 Feb 10, 2021
dmitri-d pushed a commit to dmitri-d/maistra-envoy that referenced this pull request May 18, 2021
* Ssl: avoid tracking "unknown" ciphers

Try to track the ssl.ciphers.xxx counters by cipher name instead of
ssl.ciphers.unknown where possible.

Signed-off-by: Otto van der Schaaf <[email protected]>

* Strip a few ciphers that behave differently with the openssl lib we target.

Signed-off-by: Otto van der Schaaf <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants