Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Option to disable weak ciphers #16367

Closed
Tembhum opened this issue Feb 15, 2022 · 3 comments
Closed

Option to disable weak ciphers #16367

Tembhum opened this issue Feb 15, 2022 · 3 comments

Comments

@Tembhum
Copy link

Tembhum commented Feb 15, 2022

Is your feature request related to a problem? Please describe.
Weak ciphers are considered a security vulnerability.

Describe the solution you'd like
Providing users an option to specify TLS settings in order to disable weak ciphers from Harbor.

List of Weak Cipher Examples on Harbor:

  1. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  2. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  3. TLS_RSA_WITH_AES_256_CBC_SHA
  4. TLS_RSA_WITH_AES_128_CBC_SHA
@stonezdj
Copy link
Contributor

stonezdj commented Mar 9, 2022

You could disable the weak cipher by updating the
common/config/nginx.config
change ssl_ciphers

ssl_ciphers '!SHA:!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES:';

And restart Harbor.

BTW, do you have any document or link indicate that SHA should be removed from cipher suites?

@github-actions
Copy link

github-actions bot commented Jul 5, 2022

This issue is being marked stale due to a period of inactivity. If this issue is still relevant, please comment or remove the stale label. Otherwise, this issue will close in 30 days.

@github-actions github-actions bot added the Stale label Jul 5, 2022
@github-actions
Copy link

github-actions bot commented Aug 5, 2022

This issue was closed because it has been stalled for 30 days with no activity. If this issue is still relevant, please re-open a new issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants