Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] About all zero monitoring and insecure protocols #1916

Open
hcwnbs opened this issue Feb 10, 2025 · 8 comments
Open

[BUG] About all zero monitoring and insecure protocols #1916

hcwnbs opened this issue Feb 10, 2025 · 8 comments
Assignees
Labels
help wanted Extra attention is needed kind/bug Something isn't working kind/good-first-issue Good for newcomers

Comments

@hcwnbs
Copy link

hcwnbs commented Feb 10, 2025

When I was using this software, I found some listening ports with all-zero values during the scanning process, such as 9876, 8080, 8090, and 8000. Moreover, the insecure TLS 1.0 and 1.1 protocols, as well as insecure cipher suites (for example, using RSA as the key exchange algorithm and cipher suites containing CBC symmetric cipher algorithms in the TLS protocol) are being used for port 9876. May I ask if there is any plan to address these issues?

Image

@hcwnbs hcwnbs added the kind/bug Something isn't working label Feb 10, 2025
@furykerry
Copy link
Member

it is related to the controller-runtime webhook setting, a possible fix can be refer to the issue

@furykerry furykerry added help wanted Extra attention is needed kind/good-first-issue Good for newcomers labels Feb 12, 2025
@RohanMishra315
Copy link

Hey @furykerry Could I look into this ?

@furykerry
Copy link
Member

/assign @RohanMishra315

@RohanMishra315
Copy link

Got the idea how to solve this, but having problem where should the changes be made , @furykerry could you help me a bit .

@furykerry
Copy link
Member

the webhook server initialization code is here

@zmberg
Copy link
Member

zmberg commented Feb 24, 2025

@hcwnbs What version of kruise are you using?

@furykerry
Copy link
Member

furykerry commented Feb 24, 2025

@hcwnbs actually there are two issues related

  1. the use of tls 1.0 and 1.1
  2. kruise webhook listen on all zero address

#1 is already fixed in kruise 1.8 since we have upgraded the golang version to 1.22, in which , tls 1.2 is now the default minVersion for both server and client.

for #2, maybe we should follow the logic of apiserver, and just choose the first non local address by calling ResolveBindAddress of the package k8s.io/apimachinery/pkg/util/net

@hcwnbs
Copy link
Author

hcwnbs commented Feb 24, 2025

@hcwnbs What version of kruise are you using?

I directly used the image, and the image version is 1.5.4.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed kind/bug Something isn't working kind/good-first-issue Good for newcomers
Projects
None yet
Development

No branches or pull requests

5 participants