-
Notifications
You must be signed in to change notification settings - Fork 688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
internal/envoy: Disable CHACHA20 ciphers #3347
internal/envoy: Disable CHACHA20 ciphers #3347
Conversation
Related to an ask that Contour is FIPS compliant by default. Envoy built with BoringSSL-FIPS removes the CHACHA20 cipehrs by default. Signed-off-by: Sunjay Bhatia <[email protected]>
e86e707
to
6eba5cc
Compare
Codecov Report
@@ Coverage Diff @@
## main #3347 +/- ##
==========================================
- Coverage 75.44% 75.42% -0.02%
==========================================
Files 98 98
Lines 6283 6283
==========================================
- Hits 4740 4739 -1
- Misses 1437 1439 +2
+ Partials 106 105 -1
|
Open question, should we do this in 1.13 since we plan for #3292 to be done then too? Or wait for 1.14 to give people some time to adapt? @projectcontour/maintainers |
I vote we announce this in the 1.13 and perform the deprecation on the following release, so folks have some time to react. We should release this concurrent to or after the FIPS configurability capability is released so people can customize the specific list of ciphers they need. |
There's a good use case for an easy FIPS-mode, but I don't think that FIPS is an end in itself or necessarily a good default in general. AFAIK CHACHA20 cipher suites are valid, reasonable and secure choices. https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility |
Yes, I agree that FIPS should not be Contour's default. We should make it possible to do FIPS, and document what you have to do, but I don't think that FIPS should be the default. I agree that we shouldn't turn these ciphers off by default. When you are doing FIPS, you're going to be specifying a cipher set anyway, so it's better to just document what that will be, and make sure it works. |
FIPS is too much for default for OSS I agree. So how do we provide a mechanism that allows FIPS to be kept off in OSS but the default in TKG, without having to maintain two code bases. So can we leverage the configurable cipher suites capability to not only provide granularity at the cipher suite level but also just turn FIPS on / off as a profile. I'm kinda just throwing ideas out at this point. Beware that the FIPS requirement is a long term thing for all future releases within TKG. So maintaining two Contours would be very heavy |
In terms of actual FIPS compliance, it seems to me like there are two requirements:
Then, we do not have to maintain two codebases anywhere. But we should talk more about this on #2878. Thanks for this work, @sunjayBhatia, but I think we should close this PR out. |
Sounds good to me I mostly wanted to start the conversation and capture opinions etc. I figured there would be some reticence to pulling more ciphers out etc.! I think your comments on this and the linked FIPS issue are spot on |
Related to an ask that Contour is FIPS compliant by default. Envoy built with
BoringSSL-FIPS removes the CHACHA20 ciphers by default.
Note: Should probably merge after #3292