This repository was archived by the owner on Jun 13, 2024. It is now read-only.
Security harden tls configuration #109
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What does this PR do? Please provide some context
To prevent downgrade attacks, removing insecure transport protocols and weak ciphers. TLS 1.0 is considered insecure as it lacks support for strong ciphersuites and is known to be plagued by several known vulnerabilities.
Where should the reviewer start?
main.yml
How can this be manually tested? (brief repro steps and corpnet-URL with change)
Install STAMP then view configured protocols/ciphers by running: _**nmap --script ssl-cert,ssl-enum-ciphers -p 443 <traffic manager endpoint
What are the relevant TFS items? (list id numbers)
Bugs 108784, 108778
Definition of done:
Reminders DURING merge
Configuration Pull Request
(For changes proposed to upstream)
Make sure that the following steps are done before merging