Not explicitly setting any cipher suites, just letting fips decide
Signed-off-by: Margo Crawford <margaretc@vmware.com>
This commit is contained in:
parent
d374b468d8
commit
a036c7b4c3
@ -59,13 +59,13 @@ func Default(rootCAs *x509.CertPool) *tls.Config {
|
|||||||
//
|
//
|
||||||
// The Kubernetes API server must use approved cipher suites.
|
// The Kubernetes API server must use approved cipher suites.
|
||||||
// https://stigviewer.com/stig/kubernetes/2021-06-17/finding/V-242418
|
// https://stigviewer.com/stig/kubernetes/2021-06-17/finding/V-242418
|
||||||
CipherSuites: []uint16{
|
//CipherSuites: []uint16{
|
||||||
// these are all AEADs with ECDHE, some use ChaCha20Poly1305 while others use AES-GCM
|
// // these are all AEADs with ECDHE, some use ChaCha20Poly1305 while others use AES-GCM
|
||||||
// this provides forward secrecy, confidentiality and authenticity of data
|
// // this provides forward secrecy, confidentiality and authenticity of data
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
// tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
// tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
// tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
},
|
//},
|
||||||
|
|
||||||
// enable HTTP2 for go's 1.7 HTTP Server
|
// enable HTTP2 for go's 1.7 HTTP Server
|
||||||
// setting this explicitly is only required in very specific circumstances
|
// setting this explicitly is only required in very specific circumstances
|
||||||
|
Loading…
x
Reference in New Issue
Block a user