Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: SSL Cipher Selection #535

Closed
dtomcej opened this issue Jul 15, 2016 · 2 comments · Fixed by #690
Closed

Feature Request: SSL Cipher Selection #535

dtomcej opened this issue Jul 15, 2016 · 2 comments · Fixed by #690
Labels

Comments

@dtomcej
Copy link
Contributor

dtomcej commented Jul 15, 2016

Many companies require PCI DSS validation. To be able to use Traefik with these applications, we need to be able to selectively disable SSL cipher suites that are not strong enough.

Most "big name" tools have these configuration options:

https://cipherli.st/

@emilevauge emilevauge added the kind/enhancement a new or improved feature. label Jul 15, 2016
@errm
Copy link
Contributor

errm commented Jul 15, 2016

Sounds ok in principle. Clearly in an environment where upgrading software can be a PITA making things configurable makes it simpler to keep things secure when the current best practices change.

But I am not sure that PCI DSS actually requires that cipher suites is configureable by the operator? I have no in depth understanding of PCI DSS compliance so feel free to correct me...

In practice for real security I think the most important thing is to ship with a defaults that are secure, I am reasonably sure that the current config scores A on https://www.ssllabs.com/ for example. We should add some test coverage to ensure that the default config is a) secure and b) compliant with PCI and any other relevant standards.

@dtomcej
Copy link
Contributor Author

dtomcej commented Jul 18, 2016

One of the biggest concerns right now for PCI DSS compliance is the ability to disable TLS 1.0 and soon TLS 1.1. We have also received requests from payment gateways to disable suites that use the CBC ciphers.

I agree, if the "out of the box" config is secure and compliant, that would be great, however there is a big difference between scoring an "A" on SSLlabs, and being PCI DSS compliant. The other benifit of separating the configuration for SSL out to a configurable state, is that you don't have to be constantly on top of what the current DSS regulations are.

@traefik traefik locked and limited conversation to collaborators Sep 1, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants