Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-29037

SSL Medium Strength Cipher Suites Supported for kube-controller-manager, kube-scheduler, kubelet

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done-Errata
    • Icon: Major Major
    • None
    • 4.14, 4.15, 4.16
    • MicroShift
    • Important
    • No
    • 2
    • uShift Sprint 250
    • 1
    • False
    • Hide

      None

      Show
      None
    • Hide
      During an SSL handshake between a client and a server, the cipher to use is negotiated between them. With this release, SSL Medium Strength Cipher Suites are now supported for the kube-controller-manager daemon, kube-scheduler control-plane process, and kubelet node agent. This enhancement to the internal communication between kubernetes components improves control plane communications security.
      Show
      During an SSL handshake between a client and a server, the cipher to use is negotiated between them. With this release, SSL Medium Strength Cipher Suites are now supported for the kube-controller-manager daemon, kube-scheduler control-plane process, and kubelet node agent. This enhancement to the internal communication between kubernetes components improves control plane communications security.
    • Enhancement
    • Done

      Description of problem:

          kube-controller-manager, kube-scheduler, kubelet need to support  Strength Cipher Suites

      Version-Release number of selected component (if applicable):

          

      How reproducible:

          

      Steps to Reproduce:

          1.
          2.
          3.
          

      Actual results:

          

      Expected results:

          

      Additional info:

          

            pacevedo@redhat.com Pablo Acevedo Montserrat
            lan.tian 天 兰
            Douglas Hensel Douglas Hensel
            Shauna Diaz Shauna Diaz
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

              Created:
              Updated:
              Resolved: