Retire old TLS Cipher Checks and homogenize the active ones #12749
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description:
Removing
kubelet_configure_tls_cipher_suites_openshiftapiserver_operator
andkubelet_configure_tls_cipher_suites_kubeapiserver_operator
and renamingkubelet_configure_tls_cipher_suites_ingresscontroller
to create a more concise structurethis is part of a larger effort to make all TLS Cipher Suites and their remediations configurable with variables (see https://issues.redhat.com/browse/RFE-6859 )
Rationale:
The current state of the TLS Cipher Checks is a little bit heterogenous. There are currently 6 of them:
while 1-4 are used in multiple profiles,
kubelet_configure_tls_cipher_suites_openshiftapiserver_operator
andkubelet_configure_tls_cipher_suites_kubeapiserver_operator
are only used in the default profile. they also do not really have anything to do withkubelet
and also have remediations which are unsupported or defect. There are nowadays better ways to configure TLS profiles and these are used by the newer rules.Furthermore the
kubelet_configure_tls_cipher_suites_ingresscontroller
doesnt have anything to do with thekubelet
. There are more rules regarding the ingresscontroller undernetworking
. I believe this to be an artifact, since you can see, that the newapi_server_tls_cipher_suites
is underapiserver
. Movingkubelet_configure_tls_cipher_suites_ingresscontroller
tonetworking
bundles the ingresscontroller tls rules together and makes it easier to get a grasp of what is existing.These changes should prevent people creating new profiles to use the wrong/outdated rules and also more easily find relevant rules.
Review Hints:
I checked for occurences of the rules by grepping the repository
I replaced the occurence in
controls/cis_ocp_1_4_0/section-4.yml
with the new name.
IMHO this rule does not match the requirement, as the ingresscontroller has nothing to do with the kubelet. I would recommend to remove it, as the requirement is addressed by the kubelet rule.
Furthermore I wonder, why this rule is not used in more places.
one could also go one step further and unify the naming of the cipher rules, but I think this is creating no value.