Skip to content

Commit 0e3e668

Browse files
authored
Merge pull request #12220 from rhmdnd/CMP-2196-update-ingress-operator-ciphers
CMP 2196 update ingress operator ciphers
2 parents f02f47f + 3c24d28 commit 0e3e668

File tree

8 files changed

+38
-4
lines changed

8 files changed

+38
-4
lines changed

applications/openshift/kubelet/kubelet_configure_tls_cipher_suites_ingresscontroller/kubernetes/shared.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,12 @@ spec:
1111
ciphers:
1212
- ECDHE-ECDSA-AES128-GCM-SHA256
1313
- ECDHE-RSA-AES128-GCM-SHA256
14+
- ECDHE-ECDSA-CHACHA20-POLY1305
1415
- ECDHE-RSA-AES256-GCM-SHA384
16+
- ECDHE-RSA-CHACHA20-POLY1305
17+
- ECDHE-ECDSA-AES256-GCM-SHA384
18+
- TLS_AES_128_GCM_SHA256
19+
- TLS_AES_256_GCM_SHA384
20+
- TLS_CHACHA20_POLY1305_SHA256
1521
minTLSVersion: VersionTLS12
1622
type: Custom

applications/openshift/kubelet/kubelet_configure_tls_cipher_suites_ingresscontroller/rule.yml

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,24 +18,36 @@ severity: medium
1818
# cce@ocp4:
1919

2020
references:
21-
cis@ocp4: 4.2.13
21+
cis@ocp4: 4.2.12
2222

23-
ocil_clause: "TLS cipher suite configuration is not configured"
23+
ocil_clause: "Ingress controller TLS cipher suite configuration is incomplete or possibly insecure"
2424

2525
ocil: |-
2626
Run the following command on the kubelet nodes(s):
27-
{{% raw %}}<pre>oc -n openshift-ingress-operator patch ingresscontroller/default --type merge -p '{"spec":{"tlsSecurityProfile":{"type":"Custom","custom":{"ciphers":["ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-RSA-AES128-GCM-SHA256","ECDHE-RSA-AES256-GCM-SHA384"],"minTLSVersion":"VersionTLS12"} } } }'</pre>{{% endraw %}}
27+
<pre>oc -n openshift-ingress-operator patch ingresscontroller/default --type merge -p '{"spec":{"tlsSecurityProfile":{"type":"Custom","custom":{"ciphers":["ECDHE-ECDSA-AES128-GCM-SHA256","ECDHE-ECDSA-CHACHA20-POLY1305","ECDHE-ECDSA-AES256-GCM-SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","ECDHE-RSA-AES128-GCM-SHA256","ECDHE-RSA-AES256-GCM-SHA384","ECDHE-RSA-CHACHA20-POLY1305"],"minTLSVersion":"VersionTLS12"} } } }'</pre>
2828
2929
warnings:
3030
- general: |-
3131
{{{ openshift_cluster_setting("/apis/operator.openshift.io/v1/namespaces/openshift-ingress-operator/ingresscontrollers/default") | indent(4) }}}
3232
33+
# Recommended ciphers
34+
# ECDHE-ECDSA-AES128-GCM-SHA256
35+
# ECDHE-ECDSA-CHACHA20-POLY1305
36+
# ECDHE-ECDSA-AES256-GCM-SHA384
37+
# TLS_CHACHA20_POLY1305_SHA256
38+
# TLS_AES_128_GCM_SHA256
39+
# TLS_AES_256_GCM_SHA384
40+
#
41+
# Secure ciphers
42+
# ECDHE-RSA-AES128-GCM-SHA256
43+
# ECDHE-RSA-AES256-GCM-SHA384
44+
# ECDHE-RSA-CHACHA20-POLY1305
3345
template:
3446
name: yamlfile_value
3547
vars:
3648
ocp_data: "true"
3749
filepath: '/apis/operator.openshift.io/v1/namespaces/openshift-ingress-operator/ingresscontrollers/default'
3850
yamlpath: ".status.tlsProfile.ciphers[:]"
3951
values:
40-
- value: '^(ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-RSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305|ECDHE-RSA-AES256-GCM-SHA384|ECDHE-RSA-CHACHA20-POLY1305|ECDHE-ECDSA-AES256-GCM-SHA384|AES256-GCM-SHA384|AES128-GCM-SHA256)$'
52+
- value: '^(ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-RSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305|ECDHE-RSA-AES256-GCM-SHA384|ECDHE-RSA-CHACHA20-POLY1305|ECDHE-ECDSA-AES256-GCM-SHA384|TLS_AES_128_GCM_SHA256|TLS_AES_256_GCM_SHA384|TLS_CHACHA20_POLY1305_SHA256)$'
4153
operation: 'pattern match'

controls/cis_ocp_1_4_0/section-4.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,5 +158,6 @@ controls:
158158
status: automated
159159
rules:
160160
- kubelet_configure_tls_cipher_suites
161+
- kubelet_configure_tls_cipher_suites_ingresscontroller
161162
levels: [ level_1, ]
162163

tests/assertions/ocp4/ocp4-cis-4.12.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,9 @@ rule_results:
8989
e2e-cis-api-server-kubelet-client-key-pre-4-9:
9090
default_result: NOT-APPLICABLE
9191
result_after_remediation: NOT-APPLICABLE
92+
e2e-cis-kubelet-configure-tls-cipher-suites-ingresscontroller:
93+
default_result: FAIL
94+
result_after_remediation: PASS
9295
e2e-cis-api-server-oauth-https-serving-cert:
9396
default_result: PASS
9497
result_after_remediation: PASS

tests/assertions/ocp4/ocp4-cis-4.13.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,9 @@ rule_results:
8787
e2e-cis-api-server-kubelet-client-key-pre-4-9:
8888
default_result: NOT-APPLICABLE
8989
result_after_remediation: NOT-APPLICABLE
90+
e2e-cis-kubelet-configure-tls-cipher-suites-ingresscontroller:
91+
default_result: FAIL
92+
result_after_remediation: PASS
9093
e2e-cis-api-server-oauth-https-serving-cert:
9194
default_result: PASS
9295
result_after_remediation: PASS

tests/assertions/ocp4/ocp4-cis-4.14.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,9 @@ rule_results:
8787
e2e-cis-api-server-kubelet-client-key-pre-4-9:
8888
default_result: NOT-APPLICABLE
8989
result_after_remediation: NOT-APPLICABLE
90+
e2e-cis-kubelet-configure-tls-cipher-suites-ingresscontroller:
91+
default_result: FAIL
92+
result_after_remediation: PASS
9093
e2e-cis-api-server-oauth-https-serving-cert:
9194
default_result: PASS
9295
result_after_remediation: PASS

tests/assertions/ocp4/ocp4-cis-4.15.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,9 @@ rule_results:
8989
e2e-cis-api-server-kubelet-client-key-pre-4-9:
9090
default_result: NOT-APPLICABLE
9191
result_after_remediation: NOT-APPLICABLE
92+
e2e-cis-kubelet-configure-tls-cipher-suites-ingresscontroller:
93+
default_result: FAIL
94+
result_after_remediation: PASS
9295
e2e-cis-api-server-oauth-https-serving-cert:
9396
default_result: PASS
9497
result_after_remediation: PASS

tests/assertions/ocp4/ocp4-cis-4.16.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -207,6 +207,9 @@ rule_results:
207207
e2e-cis-kubelet-disable-readonly-port:
208208
default_result: PASS
209209
result_after_remediation: PASS
210+
e2e-cis-kubelet-configure-tls-cipher-suites-ingresscontroller:
211+
default_result: FAIL
212+
result_after_remediation: PASS
210213
e2e-cis-ocp-allowed-registries:
211214
default_result: FAIL
212215
e2e-cis-ocp-allowed-registries-for-import:

0 commit comments

Comments
 (0)