-
I am a devops engineer for my team and am experiencing issues with adding two new ciphers to kubelet; specifically port 10250. Is there anyway I can limit the kubelet_extra_args just to one cipher-suite? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 23 replies
-
It's See the docs at: https://docs.rke2.io/reference/linux_agent_config |
Beta Was this translation helpful? Give feedback.
-
Oh no ! is it really? I was referencing the CIS Benchmark Self Assessment, https://docs.rke2.io/security/cis_self_assessment123 and the solution was provided. |
Beta Was this translation helpful? Give feedback.
-
Hi @brandond the parameters you provided worked as you stated. However I am unable to remove two ciphers: "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256" from the tls-cipher-suites. If you attempt to remove both of the above listed ciphers, kubelet breaks. One of the two above listed ciphers must be included in the tls-cipher-suites in order to run kubelet without it crashing. For example, I just tested only including one of the two listed ciphers and it was able to run as expected but if I removed both and only include the ciphers I am looking for it crashes. Currently the configuration I've tested has the following listed in the "/etc/rancher/rke2/config.yaml"
I can leave either one or both of the ciphers, and it will run as expected. If I leave only one of the two and the ciphers I am looking for it works as well, as shown below:
So I am able to limit the tls-cipher_suites to one, two or three ciphers. However, it has to include the 128 ciphers in order to run, without crashing.
For my use case, I need to remove the 128 ciphers in particular without kubelet continuously crashing. |
Beta Was this translation helpful? Give feedback.
Right but you can't do that. Kubernetes uses HTTP/2-enabled listeners extensively for internal components, and HTTP/2 requires
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
as per the RFC. Kubernetes (or any other HTTP/2 enabled service) does not allow what you want to do.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
is the closest you will get on a HTTP/2 endpoint.