10 Commits

Author SHA1 Message Date
Margo Crawford
215961b282
Fix some linter errors, separate securetls test for fips
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:14 -04:00
Margo Crawford
5c6fd9c6cf
Don't add cbc ecdhe ciphers for ldap in fips mode
Signed-off-by: Monis Khan <mok@vmware.com>
2022-03-29 14:40:14 -04:00
Margo Crawford
52c796b1f4
supervisor discovery test shouldn't require tls 1.3 in fips mode
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:13 -04:00
Margo Crawford
fb93620981
Set secureServing minTLSVersion to 1.2 for fips
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:13 -04:00
Margo Crawford
a036c7b4c3
Not explicitly setting any cipher suites, just letting fips decide
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:13 -04:00
Margo Crawford
d374b468d8
Using different cipher suites for fips
Signed-off-by: Monis Khan <mok@vmware.com>
2022-03-29 14:40:13 -04:00
Margo Crawford
1ee0aed054
use init func not main func
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:13 -04:00
Margo Crawford
77737039af
Fips only mode
Signed-off-by: Margo Crawford <margaretc@vmware.com>
2022-03-29 14:40:11 -04:00
Ryan Richard
fffcb7f5b4 Update to github.com/golangci/golangci-lint/cmd/golangci-lint@v1.44.2
- Two of the linters changed their names
- Updated code and nolint comments to make all linters pass with 1.44.2
- Added a new hack/install-linter.sh script to help developers install
  the expected version of the linter for local development
2022-03-08 12:28:09 -08:00
Monis Khan
cd686ffdf3
Force the use of secure TLS config
This change updates the TLS config used by all pinniped components.
There are no configuration knobs associated with this change.  Thus
this change tightens our static defaults.

There are four TLS config levels:

1. Secure (TLS 1.3 only)
2. Default (TLS 1.2+ best ciphers that are well supported)
3. Default LDAP (TLS 1.2+ with less good ciphers)
4. Legacy (currently unused, TLS 1.2+ with all non-broken ciphers)

Highlights per component:

1. pinniped CLI
   - uses "secure" config against KAS
   - uses "default" for all other connections
2. concierge
   - uses "secure" config as an aggregated API server
   - uses "default" config as a impersonation proxy API server
   - uses "secure" config against KAS
   - uses "default" config for JWT authenticater (mostly, see code)
   - no changes to webhook authenticater (see code)
3. supervisor
   - uses "default" config as a server
   - uses "secure" config against KAS
   - uses "default" config against OIDC IDPs
   - uses "default LDAP" config against LDAP IDPs

Signed-off-by: Monis Khan <mok@vmware.com>
2021-11-17 16:55:35 -05:00