Uploaded image for project: 'OpenShift Virtualization'
  1. OpenShift Virtualization
  2. CNV-23410

[2153527] unlike other CNV components, Kubevirt uses its own cipher for tls 1.2

XMLWordPrintable

    • CNV Virtualization Sprint 234, CNV Virtualization Sprint 235
    • High
    • No

      +++ This bug was initially created as a clone of Bug #2139235 +++

      Description of problem:
      HCO and SSP need to have ECDHE-ECDSA-AES128-GCM-SHA256 cipher enabled

      But Kubevirt needs ECDHE-RSA-AES128-GCM-SHA256

      Not sure if it is by design, but personally I would think we need adhere to the same standard.
      Currently, we have to be sure that both of these ciphers are present, otherwise some components become non-responding

      Version-Release number of selected component (if applicable):
      4.12

      Actual results:
      CNV components use different ciphers

      Expected results:
      CNV components use the same cipher

      — Additional comment from on 2022-11-02 12:14:15 UTC —

      I'm guessing that the severity is "high". Rationale being we should err on the safe side.

              ffossemo@redhat.com Federico Fossemo
              kbidarka@redhat.com Kedar Bidarkar
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: