-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NSM Nessus scan #5676
Comments
@edwarnicke I think we should consider this one on the bug fix week |
@richardstone will definitely check into it. |
@edwarnicke , @richardstone Do you have any updates? |
@richardstone Hello! I tried to check TLS versions with TLS 1.0
TLS 1.1
TLS 1.2
Looks like registry doesn't accept TLS 1.0 and TLS 1.1 on port 5002. Is there any other way to check this? |
@NikitaSkrynnik Great investigation! If it turns out after further investigation we are accepting TLS1 or TLS1.1 this is how we would peg to a minversion of TLS: networkservicemesh/cmd-forwarder-vpp#627 Also done here: networkservicemesh/cmd-nse-simple-vl3-docker#5 If we are actually (contrary to your findings) exposing TLS1 and TLS1.1 we'd need to do this to all cmd-* repos. |
@edwarnicke I think we can start with single application, lets check that forwarwder-vpp will be fine with TLS version patch |
@richardstone |
Nessus scan found 2 critical vulnerabilities of NSM, that the registry and the nsmgr accepts TLS 1.0 and TLS 1.1 on their ports (5002 and 5001).
Could you check how this could be handled?
Thanks!
The text was updated successfully, but these errors were encountered: