Bug 1844990: server/api: Disable unsafe ciphers for CVE-2016-2183#2420
Bug 1844990: server/api: Disable unsafe ciphers for CVE-2016-2183#2420openshift-merge-robot merged 1 commit intoopenshift:masterfrom darkmuggle:pr/CVE-2016-2183-disable_http2
Conversation
|
@darkmuggle: This pull request references Bugzilla bug 1844990, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 3 validation(s) were run on this bug
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/retest |
yuqi-zhang
left a comment
There was a problem hiding this comment.
I tested this with the steps in the BZ and I see:
SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
so I think the functionality is good. Code also generally LGTM, but I am uncertain about some of the specifics. e.g. does disabling HTTP/2 affect anything?
Disabling |
There was a problem hiding this comment.
inFirst value will always be False as we are not setting it True when it was not found in first.
There was a problem hiding this comment.
Since we are matching with Suffix here, it won't match ciphers listed in blacklist that ends with CBC_SHA256, CBC_SHA384 . Are these safe?
There was a problem hiding this comment.
SHA256, 384, and 512 are considered secure....for now.
There was a problem hiding this comment.
Really like the useful comments you have added throughout the PR ❤️
|
/retest |
There was a problem hiding this comment.
I think you meant inFirst here
There was a problem hiding this comment.
My local toolchain must be really wonky -- make verify and make test -- all worked.
With [1], SHA and 3DES are considered unsafe. [1] https://access.redhat.com/security/cve/cve-2016-2183 Signed-off-by: Ben Howard <ben.howard@redhat.com>
|
/lgtm @darkmuggle As you have done good digging, can you create a followup doc PR into https://github.com/openshift/machine-config-operator/blob/master/docs/MachineConfigServer.md with details and reason of MCO sticking to http and TLS 1.2 version |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: darkmuggle, sinnykumari, yuqi-zhang The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
10 similar comments
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
17 similar comments
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
/retest Please review the full test history for this PR and help us cut down flakes. |
|
@darkmuggle: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@darkmuggle: All pull requests linked via external trackers have merged:
Bugzilla bug 1844990 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
With [1], SHA and 3DES Ciphers are considered unsafe.
http/2 requires these inseucre Ciphers which means that fixing the CVE requires disableing http/2
[1] https://access.redhat.com/security/cve/cve-2016-2183
This change will not conflict with the TLS profile work coming later.