-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow only TLS - Fixes POODLE CVE-2014-3566 #150
Conversation
|
@kbarber ping |
|
@ghoneycutt I've been aware of this one, but since we've already patched PuppetDB with the 2.2.2 release to drop SSLv3 from the defaults I'm still considering whether providing the defaults here in the module is a good idea or not. The problem being, defaults in two places will cause natural drift unless one is very attentive. The ability to change it on its own is fine. Thoughts? On another note I'm getting sick of how static new options are in this module as well. I really want to fix this so we're not having to modify the module every time we change PuppetDB. Just an aside, but it does feel like a lot of extra work for what is ultimately just a mapping exercise. |
|
@ghoneycutt ping, see my previous comment. |
|
@kbarber I believe this and any other bit of configuration should be in the module since that is the way to manage your PuppetDB installation. Perhaps you do not always use this module for PuppetDB since you are a developer, but as a consumer, I want this module to be the canonical way to manage every aspect of the software. There will be some duplication in settings between PuppetDB itself and this module, but this should only be for the default settings such as this one, which is normal behavior when writing modules. |
It is one of many potential ways. We also change defaults on users at times in the core clojure parts of PuppetDB when we know they are no longer meaningful. Not every user uses the module also. @ghoneycutt I think you're seeing this from a different angle to me, so perhaps I'll explain in another way. The defaults for ssl-protocols are already defined in the latest version of PuppetDB, and are set to TLSv1, TLSv1.1 and TLSv1.2 as of PuppetDB 2.2.2 which was released a few days ago. Right now that default is there and active and it's a reasonable one for the current situation. The module on the other hand doesn't have to express a duplicate copy of this default, we've made that decision already in the core code. Expressing it there as well means when we change the default in the core code, we have to also change it in the module and release them in lock step with each other, otherwise the effort won't be as effective. I agree that we should have a way to configure this setting in the module, but what I do not currently agree with is setting a default in the module. I would rather stop doing that to avoid the maintenance going forward. We already have examples of this that are annoying, and they should go away as well. So right now I'd happily take a patch that changes the setting like you show here, but one that didn't also provide a default, so if no param was provided it simply did nothing. |
|
Should I set the param to |
|
@ghoneycutt I think that's suitable for now. |
This is in response to CVE-2014-3566 - POODLE
Allow only TLS - Fixes POODLE CVE-2014-3566
|
Thanks Ken |
No description provided.