-
Bug
-
Resolution: Done-Errata
-
Major
-
None
-
3
-
False
-
-
False
-
CLOSED
-
---
-
---
-
-
-
CNV Virtualization Sprint 234, CNV Virtualization Sprint 235
-
High
-
No
+++ This bug was initially created as a clone of Bug #2139235 +++
Description of problem:
HCO and SSP need to have ECDHE-ECDSA-AES128-GCM-SHA256 cipher enabled
But Kubevirt needs ECDHE-RSA-AES128-GCM-SHA256
Not sure if it is by design, but personally I would think we need adhere to the same standard.
Currently, we have to be sure that both of these ciphers are present, otherwise some components become non-responding
Version-Release number of selected component (if applicable):
4.12
Actual results:
CNV components use different ciphers
Expected results:
CNV components use the same cipher
— Additional comment from on 2022-11-02 12:14:15 UTC —
I'm guessing that the severity is "high". Rationale being we should err on the safe side.
- is blocked by
-
CNV-22162 [2139235] unlike other CNV components, Kubevirt uses its own cipher for tls 1.2
- Closed
- external trackers
- links to