-
Notifications
You must be signed in to change notification settings - Fork 8.4k
Default SSL Ciphers incompatible with AWS ELB #2182
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Closing. You can customize the ciphers in the configuration configmap. |
I do agree that we need some documentation around this. The symptom of timeouts does not make it obvious where the problem is. |
It looks like this has fallen by the wayside? |
Is this a request for help? No
What keywords did you search in NGINX Ingress controller issues before filing this one? ELB
NGINX Ingress controller version: 0.10.2
Kubernetes version (use
kubectl version
):Environment:
uname -a
): Linux 3.10.0-693.17.1.el7.x86_64 Basic structure #1 SMP Thu Jan 25 20:13:58 UTC 2018 x86_64 x86_64 x86_64 GNU/LinuxWhat happened: ELB times out making SSL/HTTPS connection to the nginx ingress controller (NodePort).
What you expected to happen: ELB can terminate TLS and proxy to upstream nginx ingress controller port 443.
How to reproduce it (as minimally and precisely as possible): helm install the nginx-ingress chart using service type LoadBalancer and annotations:
Anything else we need to know:
Nignx closes the TLS connection after the ClientHello. Trace from ssldump:
As you can see, the ELB client has a limited set of supported ciphers. I was able to get this working in two ways:
I don't necessarily think this is a bug, but probably documentation should be added for getting ELBs to talk to the ingress controller over TLS.
The text was updated successfully, but these errors were encountered: