Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explicitly setting protocols and ciphers for TLS profiles #1678

Closed
adibrastegarnia opened this issue Nov 21, 2024 · 3 comments
Closed

Explicitly setting protocols and ciphers for TLS profiles #1678

adibrastegarnia opened this issue Nov 21, 2024 · 3 comments

Comments

@adibrastegarnia
Copy link

adibrastegarnia commented Nov 21, 2024

Based on this scheme

,
It appears that setting TLS profiles and ciphers is achievable by creating ConfigMaps using a custom client that specifies these attributes. My question is whether these settings will be effective and if there are any potential side effects to be aware of?

@kgiusti
Copy link
Contributor

kgiusti commented Nov 26, 2024

Hi - the router will use the protocols (and ciphers) values when configuring TLS connections, so yes that should work. Couple of things to be aware of:

  • the router reads its configuration at startup, so you'll need to restart the router after you modify the config
  • the router passes these values down to the openssl library, so the values need to be available in the version of openssl the router has been linked to.
  • I believe the router control plane won't overwrite these values - let us know otherwise so we can fix it.

I'm interested in your use-case: are you trying to support legacy clients/server that use older TLS protocols/cyphers?

@ganeshmurthy
Copy link
Contributor

@adibrastegarnia , was your question answered ? Can I close this issue ?

@adibrastegarnia
Copy link
Author

@adibrastegarnia , was your question answered ? Can I close this issue ?

Yes. Thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants