Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[v14] Disable AWS IMDSv1 fallback and enforce use of FIPS endpoints #34433

Merged
merged 1 commit into from Nov 16, 2023

Commits on Nov 9, 2023

  1. Disable AWS IMDSv1 fallback and enforce use of FIPS endpoints

    Two changes to AWS SDK usage:
    
    Teleport should never use AWS IMDSv1 for requests, so disable the
    ability to fallback to it, as it could be a malicious attempt to
    downgrade security.
    
    Teleport generally prefers FIPS endpoints when in FIPS mode, but
    there were a few places that were not selecting the FIPS endpoints.
    Ensure that the FIPS endpoints if BoringCrypto is being used.
    reedloden authored and github-actions committed Nov 9, 2023
    Configuration menu
    Copy the full SHA
    fb4e20a View commit details
    Browse the repository at this point in the history