You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Relatively recently health endpoint has been secured so it's accessible over 443. Think a one liner bit of config / configurable could be created which could tighten security and make it pass a security scan.
Affected Versions
Any versions that have the healthz endpoint served over 443. We use v0.293.0
Context
Internal security have scanned and said that the data is being served over vulnerable ciphers
Is this a security vulnerability?
Kinda. SHA1 shouldn't be used really
Issue
Relatively recently health endpoint has been secured so it's accessible over 443. Think a one liner bit of config / configurable could be created which could tighten security and make it pass a security scan.
Affected Versions
Any versions that have the healthz endpoint served over 443. We use v0.293.0
Context
Internal security have scanned and said that the data is being served over vulnerable ciphers
Traffic Diagram
Not applicable
Steps to Reproduce
nmap -sV --script ssl-enum-ciphers -p 443 tcp-router-address
Expected result
Current result
Possible Fix
We could add a line to haproxy.conf.erb#L7C49-L8C1
ssl-default-bind-ciphers ECDH+AESGCM:ECDH+AES256:ECDH+AES128:!aNULL:!SHA1:!AESCCM
Additional Context
Could even make it configurable so that particular companies can harden according to their own best practices.
The text was updated successfully, but these errors were encountered: