Not explicitly setting any cipher suites, just letting fips decide

Signed-off-by: Margo Crawford <margaretc@vmware.com>
This commit is contained in:
Margo Crawford 2022-03-16 09:48:47 -07:00 committed by Monis Khan
parent d374b468d8
commit a036c7b4c3
No known key found for this signature in database
GPG Key ID: 52C90ADA01B269B8

View File

@ -59,13 +59,13 @@ func Default(rootCAs *x509.CertPool) *tls.Config {
// //
// The Kubernetes API server must use approved cipher suites. // The Kubernetes API server must use approved cipher suites.
// https://stigviewer.com/stig/kubernetes/2021-06-17/finding/V-242418 // https://stigviewer.com/stig/kubernetes/2021-06-17/finding/V-242418
CipherSuites: []uint16{ //CipherSuites: []uint16{
// these are all AEADs with ECDHE, some use ChaCha20Poly1305 while others use AES-GCM // // these are all AEADs with ECDHE, some use ChaCha20Poly1305 while others use AES-GCM
// this provides forward secrecy, confidentiality and authenticity of data // // this provides forward secrecy, confidentiality and authenticity of data
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, // tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, // tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, // tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
}, //},
// enable HTTP2 for go's 1.7 HTTP Server // enable HTTP2 for go's 1.7 HTTP Server
// setting this explicitly is only required in very specific circumstances // setting this explicitly is only required in very specific circumstances