-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate TLS v1.0, TLS v1.1 and SSLv3 #8633
Comments
@rikatz: This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I think it's valuable and to be more secure But considering that this project is a Proxy, we need to have a clear deprecation plan to avoid sudden impact on users |
agreed, not sure what approach we can take. Maybe for the next release a feature flag with tls disabled but being able to enable it, then removing on the other one |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle active |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle frozen |
I think we have achieved the goal of this issue and the documentation has also been updated. #10473 |
We still support people setting tls 1.0, not? |
In fact, as described in the PR I quoted above, it can no longer be set after 1.6. I will check again later with the latest version |
https://github.com/kubernetes/ingress-nginx/blob/main/internal/ingress/annotations/proxyssl/main.go#L43 here's an example where we should be removing it |
/assign |
Minimum requirement now is TLSv1.2
The logs are supporting
So I will close the issue for now. If we find the deprecation is not complete, then we can re-open this. /close |
@longwuyuan: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I'll add some more information for others to refer to. I use the following configuration and directly use it through the openresty
It can only work with TLS v1.2+ for requests. In addition, as mentioned by @longwuyuan in the above comment, I also configured it through configmap and annotations. Similarly, it can only work with TLS v1.2+. |
/reopen I will put in a PR to remove references to TLSv1 & TLSv1.1 in the const and the var in the proxyprotocol.go |
@longwuyuan: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
In addition, the following annotation seems to not be working properly. I will investigate why it did not take effect when I have time.
I can only use configmap to change the configurations related |
great, there are open issues related to that annotation, if I am not wrong |
@tao12345666333 @rikatz , I understand tons of software ship with SSLv2 and SSLv3 support but since we are in this issue, what is the general opinion you both have in keeping SSLv2 & SSLv3 showing up in the code. Since I am already trying to submit a cosmetic PR to remove the strings TLSv1 & TLSv1.1, I can also remove the strings SSLv2 & SSLv3, if you think its an improvement. |
Since TLSv1.0 and v1.1 are no longer applicable, SSL v2 and v3 can also be removed. |
TLS v1.0 and TLS v1.1 is being deprecated in a lot of software:
Go v1.18 already removed it as a default: golang/go#45428
Some SSL Libraries (OpenSSL, as an example) and some browsers already don't support it anymore.
We need to establish a plan to deprecate those and keep only TLS v1.2 to v1.3
The text was updated successfully, but these errors were encountered: