You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
0.32.0 does not change default ssl ciphers, weak ones are not reintroduced. (+1 from me for that)
A future release (0.32.1?) will likely enable TLS 1.3 protocol by default (once #5491 is merged and released). Enabling TLS 1.3 protocol is just that, has no effect on default ciphers, they remain unchanged, i.e. weak ones removed through #4813 are not going to be (re)enabled by default, documented user action is needed to override the default configuration and reenable weak ciphers on demand.
NGINX Ingress controller version: Regressed since 0.27.1, and confirmed that we have the same issue on 0.30.0 as well.
Kubernetes version (use
kubectl version
): 1.16.9Environment: Azure
What happened:
Since version 0.27.1, Nginx Ingress Controller started to use a weak TLS cipher suites which start to get our services get flagged in SSLScanner tool:
We are getting flagged for missing TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 cipher suits in SSLScanner.
This issue never happens on version 0.26.2.
What you expected to happen:
Nginx Ingress Controller should use a correct TLS cipher suites that include following two cipher suites:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
How to reproduce it:
Reproducible in nginx ingress controllers since 0.27.1
The text was updated successfully, but these errors were encountered: