-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix: ssl_protocols does not rely on ssl_cipher_suite property #12118
Conversation
There was a support case recently where they wanted to disable TLSv1.1. However because the ssl_protocols property had a statement about being ignored unless the ssl_cipher_suite was set to custom, this led to additional issues / time wasted troubleshooting. The ssl_protocols property does _not_ require the ssl_cipher_suite to be custom.
|
@d19dotca Thanks for the PR. But I don't think the obversation is correct.
which matches what the document says. Could you share the config that makes you believe the document is incorrect? |
Yes, the observation is not correct, see: |
@bungle & @fffonion - so this is interesting. In my testing, I by default have no If I explicitly set Additionally in the Kong Manager UI, I could see it recognized the change to Is this unexpected behaviour then and perhaps indicative of a bug elsewhere rather than the documentation? This one property change also worked for the customer as well (i.e. they didn't need to specify I guess ultimately this brings the question... how do we explain this observation in our testing? For what it's worth.. here is my kong-ent container inspection output for the env section:
In my testing, if I ran
However when I run
|
@d19dotca ah that's because openssl 3.x disables TLSv1.1 and lower by default (See https://www.openssl.org/docs/man3.1/man3/SSL_CTX_set_security_level.html, we are on SecLevel=1). We will need to update document around it. |
Also on |
@bungle it does not anymore after we move to openssl 3.x. For |
Summary
There was a support case recently where they wanted to disable TLSv1.1. However because the ssl_protocols property had a statement about being ignored unless the ssl_cipher_suite was set to custom, this led to additional issues / time wasted troubleshooting. The ssl_protocols property does not require the ssl_cipher_suite to be custom.
Checklist
changelog/unreleased/kong
orskip-changelog
label added on PR if changelog is unnecessary. README.mdFull changelog
Issue reference
N/A