Skip to content

Set TLS 1.2 minimum for all endpoints#2025

Merged
azdagron merged 2 commits intospiffe:masterfrom
azdagron:set-tls12-minimum-for-all-endpoints
Dec 18, 2020
Merged

Set TLS 1.2 minimum for all endpoints#2025
azdagron merged 2 commits intospiffe:masterfrom
azdagron:set-tls12-minimum-for-all-endpoints

Conversation

@azdagron
Copy link
Member

The server API endpoint already enforces TLS 1.2 as the minimum TLS
version. However, the bundle endpoint and k8s registrar endpoints still
accept TLS 1.0/1.1 clients. This change updates those servers to also
enforce at least TLS 1.2.

Fixes: #2024

The server API endpoint already enforces TLS 1.2 as the minimum TLS
version. However, the bundle endpoint and k8s registrar endpoints still
accept TLS 1.0/1.1 clients. This change updates those servers to also
enforce at least TLS 1.2.

Fixes: spiffe#2024

Signed-off-by: Andrew Harding <aharding@vmware.com>
Copy link
Member

@amartinezfayo amartinezfayo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚢

@azdagron azdagron merged commit 1ab3f31 into spiffe:master Dec 18, 2020
@azdagron azdagron deleted the set-tls12-minimum-for-all-endpoints branch December 18, 2020 17:51
@azdagron azdagron added this to the 0.12.2 milestone Mar 23, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Spire accepts TLS 1.0 and TLS 1.1

2 participants