Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configuration option or disable vulnerable TLS versions #51

Open
josephpippin opened this issue Feb 22, 2018 · 2 comments
Open

Configuration option or disable vulnerable TLS versions #51

josephpippin opened this issue Feb 22, 2018 · 2 comments

Comments

@josephpippin
Copy link

josephpippin commented Feb 22, 2018

The issue we are experiencing is when a security scan is issued against our docker hosts, they are found vulnerable to TLS version 1.0 and 1.1 on port 2376. We are using a self signed certificate.

Perhaps a daemon configuration option could be added to disable/enable TLS versions or just remove support for the vulnerable versions of TLS for the daemon.

openssl s_client -connect dockerhost01:2376 -tls1

New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
**Secure Renegotiation IS supported**
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1
~~~~ output omitted ~~~~


_openssl s_client -connect dockerhost01:2376 -tls1_1_
~~~~ output omitted ~~~~
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
**Secure Renegotiation IS supported**
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.1
~~~~ output omitted ~~~~
@adshmh
Copy link

adshmh commented Mar 17, 2018

I think go-connections already has the ability to accept minimum TLS versions: #31
However, a PR to allow the same on docker daemon was not approved due to security concerns. At the time, the suggestion seemed to be hard-coding the minimum accepted TLS version in the daemon.

@thaJeztah
Copy link
Member

This was changed recently in #50, and #49. Also see #45, which allow passing configuration options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants