Charm support for configuring SSL/TLS protocols/ciphers
Bug #1851673 reported by
David O Neill
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ceph RADOS Gateway Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
Charm Helpers |
Won't Fix
|
Undecided
|
Unassigned | ||
OpenStack Ceilometer Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Cinder Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Dashboard Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Glance Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Heat Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Keystone Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Neutron API Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Nova Cloud Controller Charm |
Won't Fix
|
Wishlist
|
Unassigned | ||
OpenStack Swift Proxy Charm |
Won't Fix
|
Wishlist
|
Unassigned |
Bug Description
The charm needs to support changing apache cipher protocols/suites to meet customer IP security policies.
E.g
/etc/apache2/
SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 -TLSv1.2
thank you
information type: | Public → Public Security |
summary: |
- cipher + Charm support for configuring SSL/TLS protocols/ciphers |
Changed in charm-openstack-dashboard: | |
status: | Incomplete → New |
Changed in charm-openstack-dashboard: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-ceilometer: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-ceph-radosgw: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-cinder: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-glance: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-heat: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-keystone: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-neutron-api: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-nova-cloud-controller: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Changed in charm-swift-proxy: | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
To post a comment you must log in.
The charms should do sane things by default:
SSLProtocol +TLSv1 +TLSv1.1 +TLSv1.2 !MD5:!aNULL: !eNULL: !EXP:!LOW: !MEDIUM
SSLCipherSuite HIGH:!RC4:
and be opinionated about what is secure based on recognised security standards.
So I'd prefer not to have an config option here but to review our default baseline for SSL TLS termination and update if need be.