-
The official documentation for encryption at rest providers has some pretty confusing security guidelines for AES-GCM: https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/#providers.
I…
-
Hi,
I have recently started using version (OpenSSL 3.3.0-dev) where I am looking at aead encryption and decryption.
It seems that something has been broken in decryption. Has something changed from…
-
**Is your feature request related to a problem? Please describe.**
I would like to limit the TLS version and TLS cipher suites used by the kubelet when communicating with the control plane. Kubelet …
-
Exchange Online currently seems to support several 'phase out' ciphers (see list below). However, at the moment Internet.nl does not seem to detect these.
```
'AES256-GCM-SHA384 (TLS_RSA_WITH_AES_…
baknu updated
3 months ago
-
What is "Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve." ?
I see it at the log.
Thanks
-
## Is this a security vulnerability?
Kinda. SHA1 shouldn't be used really
## Issue
Relatively recently health endpoint has been secured so it's accessible over 443. Think a one liner bit of confi…
-
### Welcome!
- [X] Yes, I've searched similar issues on [GitHub](https://github.com/traefik/traefik/issues) and didn't find any.
- [X] Yes, I've searched similar issues on the [Traefik community foru…
-
I have a server that supports the following cipher suites, in this order, with the prefer ChaCha20 setting enabled:
TLS_AES_128_GCM_SHA256 (0x1301)
TLS_AES_256_GCM_SHA384 (0x1302)
TLS_AES_128_CCM…
-
There are no configuration parameters that allow to select what TLS versions and exact ciphers should be enabled.
At this moment there are TLS1.0 and TLS1.1 enabled including 3DES ciphers vulnerabl…
-
There is an issue while decrypting multiple chunks :
```
const decryptor = new asmCrypto.AES_GCM(new Uint8Array(aesKey), new Uint8Array(iv), new Uint8Array(tag), tagLength/8);
const buffer1 = d…