You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When installing Tentacle on an RHEL 8 (tested 8.2) server, it doesn't appear the TLS settings are being applied as specified at a system level.
Using update-crypto-policies --set <policy> and using the DEFAULT policy should mean the tentacle port (e.g. 10933) will not use TLS 1.0 as listed here:
According to that configuration, only TLS 1.2 and above should be allowed system-wide, but when checking protocol levels available over the port, we're seeing TLS 1.0, 1.1, 1.2 still available.
Use the following to test the connection on the server itself after creating a new tentacle instance:
Team
What happened?
When installing Tentacle on an RHEL 8 (tested 8.2) server, it doesn't appear the TLS settings are being applied as specified at a system level.
Using
update-crypto-policies --set <policy>
and using theDEFAULT
policy should mean the tentacle port (e.g. 10933) will not use TLS 1.0 as listed here:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening#switching-the-system-to-fips-mode_using-the-system-wide-cryptographic-policies
According to that configuration, only TLS 1.2 and above should be allowed system-wide, but when checking protocol levels available over the port, we're seeing TLS 1.0, 1.1, 1.2 still available.
Use the following to test the connection on the server itself after creating a new tentacle instance:
openssl s_client -connect localhost:10933 -quiet -tls1_2
openssl s_client -connect localhost:10933 -quiet -tls1_1
openssl s_client -connect localhost:10933 -quiet -tls1
Questions
Is there somewhere else this should be configured in RHEL to restrict tentacle communications or another way this should be done?
Why is Tentacle not respecting the OS-level settings? (Some discussion in slack threads linked)
Why does Tentacle specify TLS versions on the ServicePointManager, and is this still required?
Reproduction
OR
/etc/pki/tls/openssl.cnf
Configure tentacle will not work as openssl cert generation is disabled with fips, run the below code to configure a tentacle
openssl s_client -connect localhost:10933 -quiet -tls1_2
openssl s_client -connect localhost:10933 -quiet -tls1_1
openssl s_client -connect localhost:10933 -quiet -tls1
Will still listen over TLS 1 and 1.1.
Error and Stacktrace
More Information
Internal slack discussion:
https://octopusdeploy.slack.com/archives/C27FNL3QW/p1682578455691219
https://octopusdeploy.slack.com/archives/CG9E93KLJ/p1682579067675749
Zendesk ticket threads:
https://octopus.zendesk.com/agent/tickets/96548
https://octopus.zendesk.com/agent/tickets/101467
https://octopus.zendesk.com/agent/tickets/103405
https://octopus.zendesk.com/agent/tickets/111245
https://octopus.zendesk.com/agent/tickets/119557
This may be caused by the ServicePointManager.SecurityProtocol in Tentacle
Workaround
NA
The text was updated successfully, but these errors were encountered: