-
Bug
-
Resolution: Duplicate
-
Major
-
None
-
4.11
-
None
-
Important
-
No
-
Proposed
-
False
-
customer runs "nmap sV --script ssl-enum-ciphers -p 9201,9202,9203,9204,9205,9211 10.151.198.6" and 2 out of his 3 master nodes report:
cipher preference: server
warnings:
64-bit block cipher 3DES vulnerable to SWEET32 attack
We can see on his OpenShift 4.11 cluster this comes from the CSI driver, a running container on the OpenShift master nodes
openshift-cluster-csi-drivers/apps/deployments.yaml
k:
:
--secure-listen-address=0.0.0.0:9201
containerPort: 9201
hostPort: 9201
This is part of the azure-disk-csi-driver-controller. From its log:
main.go:339] Starting TCP socket on 0.0.0.0:9201
main.go:346] Listening securely on 0.0.0.0:9201
http: TLS handshake error from 10.150.10.139:47650: read tcp 10.151.198.7:9201->10.150.10.139:47650: read: connection reset by peer
summary:
Scans are done from the internal network, from a workstation
OpenShift runs in the Azure cloud
Only master nodes are reported as vulnerable
"curl -vvv -k $(oc whoami --show-server)" to a master only shows TLSv1.3
"nmap sV --script ssl-enum-ciphers -p 9201,9202,9203,9204,9205,9211 10.151.198.6" shows 3DES and TLSv1.2
- duplicates
-
OCPBUGS-18418 [4.11] set TLS cipher suites in Kube RBAC sidecars
- Closed