Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow specifying haproxy SSL Cipher list #14505

Merged
merged 2 commits into from
Jun 12, 2017

Commits on Jun 6, 2017

  1. Update router cipher suites

    From https://wiki.mozilla.org/Security/Server_Side_TLS
    update the three cipher suites:
      # Modern cipher suite (no legacy browser support) - not currently used
      # Intermediate cipher suite (default) - currently used
      # Old cipher suite (maximum compatibility but insecure) - not currently used
    pecameron committed Jun 6, 2017
    Configuration menu
    Copy the full SHA
    f5dc9cc View commit details
    Browse the repository at this point in the history

Commits on Jun 9, 2017

  1. Allow specifying haproxy SSL Cipher list

    The user can select from among 3 predefined cipher lists: modern,
    intermediate, or old. Alternatively the use may  provide a custom
    cipher list see "man 1 ciphers". The list is used to negotiate a
    cipher between a user and haproxyi during bind.
    
    The predefined lists are from:
    https://wiki.mozilla.org/Security/Server_Side_TLS
    
    A new option to "oc adm router", --ciphers, is added to specify
    the cipher list. The values are modern|intermediate|old, or a
    ":" separated list of ciphers from "man 1 ciphers"
    
    Option --ciphers creates an environmen variable, ROUTER_CIPHERS,
    which is passed to the router pod.
    
    See https://trello.com/c/oeP7vrTZ
    pecameron committed Jun 9, 2017
    Configuration menu
    Copy the full SHA
    f2896fc View commit details
    Browse the repository at this point in the history