You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
rke2 version v1.28.2+rke2r1 (7466261e4792e68baa2cc0c2afd3dcc929d72061)
go version go1.20.8 X:boringcrypto
Cluster Configuration:
single server (irrelevant)
Describe the bug:
When configuring the minimum TLS version to 1.3, specifying a subset of the FIPS-allowed cipher suites (possibly not relevant), a client connection from openssl s_client somehow negotiates a cipher of TLS_CHACHA20_POLY1305_SHA256.
Golang intentionally does not allow configuration of cipher suites when using TLS 1.3. I feel like we should close this as WONTFIX given it is not something we can exert control over, as the discussion on that issue goes back 5 years without any change in stance.
Environmental Info:
RKE2 Version:
Node(s) CPU architecture, OS, and Version:
Cluster Configuration:
Describe the bug:
When configuring the minimum TLS version to 1.3, specifying a subset of the FIPS-allowed cipher suites (possibly not relevant), a client connection from
openssl s_client
somehow negotiates a cipher ofTLS_CHACHA20_POLY1305_SHA256
.Steps To Reproduce:
Expected behavior:
Actual behavior:
TLS_CHACHA20_POLY1305_SHA256
which is not allowed via config:Additional context / logs:
One assumes this will be resolved with FIPS 140-3 support from boringssl?
The text was updated successfully, but these errors were encountered: