You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -154,7 +156,7 @@ Name | Encryption | Strength | Speed | Key Length | Other Considerations
154
156
`secretbox`| XSalsa20 and Poly1305 | Strong | Faster | 32-byte | A newer standard and may not be considered acceptable in environments that require high levels of review.
155
157
`aesgcm`| AES-GCM with random nonce | Must be rotated every 200k writes | Fastest | 16, 24, or 32-byte | Is not recommended for use except when an automated key rotation scheme is implemented.
156
158
`aescbc`| AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding | Weak | Fast | 32-byte | Not recommended due to CBC's vulnerability to padding oracle attacks.
157
-
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/)
159
+
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding (prior to v1.25), using AES-GCM starting from v1.25, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/)
158
160
159
161
Each provider supports multiple keys - the keys are tried in order for decryption, and if the provider
160
162
is the first provider, the first key is used for encryption.
@@ -392,7 +394,7 @@ program to retrieve the contents of your secret data.
392
394
4. 通过 API 检索,验证 Secret 是否被正确解密:
393
395
394
396
```shell
395
-
kubectl describe secret secret1 -n default
397
+
kubectl get secret secret1 -n default -o yaml
396
398
```
397
399
398
400
<!--
@@ -489,8 +491,7 @@ resources:
489
491
```
490
492
491
493
<!--
492
-
Then run the following command to force decrypt
493
-
all Secrets:
494
+
Then run the following command to force decrypt all Secrets:
0 commit comments