-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use secure ciphers for metrics-server #7556
Milestone
Comments
This was referenced May 31, 2023
Validated using commit id b66a118 on master branchEnvironment DetailsInfrastructure Node(s) CPU architecture, OS, and Version: Cluster Configuration: Steps to reproduce
Results from reproducing the issue:
Results from validation:
Confirming there is no use of 3DES encryption suite and there are no warnings and least strength: A
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
K3s ships with a fairly secure set of default cipher suites for the apiserver. Unfortunately the metrics-server still uses some fairly old and insecure defaults. The metrics-server doesn't expose anything confidential, but it does still show up on TLS scans as being insecure.
We should update the metrics-server packaged manifest to specify the same set of cipher suites as we use for the apiserver:
k3s/pkg/cli/server/server.go
Lines 380 to 385 in 2b24c99
Ref: SURE-6331
The text was updated successfully, but these errors were encountered: