-
Notifications
You must be signed in to change notification settings - Fork 3.4k
ipsec: Deprecate global IPsec keys #33504
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Using a single IPsec key for all IPsec tunnels is insecure. It was only preserved to allow for a smooth switch to per-tunnel keys. Per-tunnel keys have been released in v1.13, v1.14, and v1.15, so we can now deprecate the insecure alternative for v1.16. Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
72cf1d8
to
2f9a943
Compare
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
I think this would benefit from a mention in the upgrade notes. And maybe a few lines in the IPsec docs to describe the new key system, so that users understand what the deprecation actually means?
Done at #33564. |
The global IPsec key system is deprecated [0], prefer the new per-tunnel key system. [0] #33504 Reported-by: Marcel Zięba <marcel.zieba@isovalent.com> Signed-off-by: Julian Wiedmann <jwi@isovalent.com>
The global IPsec key system is deprecated [0], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs [1] addressed first. [0] #33504 [1] #32040 Reported-by: Marcel Zięba <marcel.zieba@isovalent.com> Signed-off-by: Julian Wiedmann <jwi@isovalent.com>
The global IPsec key system is deprecated [0], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs [1] addressed first. [0] #33504 [1] #32040 Reported-by: Marcel Zięba <marcel.zieba@isovalent.com> Signed-off-by: Julian Wiedmann <jwi@isovalent.com>
The global IPsec key system is deprecated[^1], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs[^2] addressed first. [^1]: cilium/cilium#33504 [^2]: cilium/cilium#32040 Signed-off-by: Tobias Klauser <tobias@cilium.io>
The global IPsec key system is deprecated[^1], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs[^2] addressed first. [^1]: cilium/cilium#33504 [^2]: cilium/cilium#32040 Signed-off-by: Tobias Klauser <tobias@cilium.io>
The global IPsec key system is deprecated[^1], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs[^2] addressed first. [^1]: cilium/cilium#33504 [^2]: cilium/cilium#32040 Signed-off-by: Tobias Klauser <tobias@cilium.io>
The global IPsec key system is deprecated[^1], prefer the new per-tunnel key system. This switches most workflows over to the new system, except conformance-eks which needs[^2] addressed first. [^1]: cilium/cilium#33504 [^2]: cilium/cilium#32040 Signed-off-by: Tobias Klauser <tobias@cilium.io>
Using a single IPsec key for all IPsec tunnels is insecure. It was only preserved to allow for a smooth switch to per-tunnel keys. Per-tunnel keys have been released in v1.13, v1.14, and v1.15, so we can now deprecate the insecure alternative for v1.16.