Open chidambaranathan-r opened 1 year ago
The certificate for webhooks is generated via the genCA
function in Helm ( see here ) which itself uses the Sprig library.
We would recommend asking for updates via these contributors but for production settings you should use tools such as certManager which can generate the required Secret.
@cliveseldon Our understanding is that this is related to configuration of TLSOpts for Seldon webhook and not how the certificate is generated.
See TLSOpts
If nothing is set, then it defaults to TLS 1.0 Flow of control: Server start calls tlsVersion
Options to set this are exposed by this PR in controller-runtime. This became available in 0.13.1 of controller-runtime so would need to upgrade to this version and expose envar/command line args to allow this value(s) to be set.
@cliveseldon Actually, this is added as "To do" for 1.17.0 Any plans to consider this in upcoming releases?
Describe the bug
We found below vulnerabilities while scanning seldon core 1.16.0 deployed on Kubernetes 1.24.X version using Tenable-SC
Issue 1:
TLS version 1.0 and 1.1 protocol detection in webhook port of seldon
Issue 2:
SSL Medium strength cipher suites supported (SWEET32) in webhook port of seldon
We looked at the seldon core operator code and could not find any configuration to set the minimum TLS version. Could you please guide us on the above so that we can set the minimum TLS version >=1.2?
To reproduce
Expected behaviour
There should be a configuration option that allows to configure the minimum TLS version and cipher suites
Environment
K8s 1.24