|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * service_mesh/v1x/ossm-security.adoc |
| 4 | + |
| 5 | +[id="ossm-security-cipher-1x_{context}"] |
| 6 | += Configuring cipher suites and ECDH curves |
| 7 | + |
| 8 | +Cipher suites and Elliptic-curve Diffie–Hellman (ECDH curves) can help you secure your service mesh. You can define a comma separated list of cipher suites using `spec.istio.global.tls.cipherSuites` and ECDH curves using `spec.istio.global.tls.ecdhCurves` in your `ServiceMeshControlPlane` resource. If either of these attributes are empty, then the default values are used. |
| 9 | + |
| 10 | +The `cipherSuites` setting is effective if your service mesh uses TLS 1.2 or earlier. It has no effect when negotiating with TLS 1.3. |
| 11 | + |
| 12 | +Set your cipher suites in the comma separated list in order of priority. For example, `ecdhCurves: CurveP256, CurveP384` sets `CurveP256` as a higher priority than `CurveP384`. |
| 13 | + |
| 14 | +[NOTE] |
| 15 | +==== |
| 16 | +You must include either `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256` or `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256` when you configure the cipher suite. HTTP/2 support requires at least one of these cipher suites. |
| 17 | +
|
| 18 | +==== |
| 19 | + |
| 20 | +The supported cipher suites are: |
| 21 | + |
| 22 | +* TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 |
| 23 | +* TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 |
| 24 | +* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
| 25 | +* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
| 26 | +* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
| 27 | +* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
| 28 | +* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
| 29 | +* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA |
| 30 | +* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
| 31 | +* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA |
| 32 | +* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
| 33 | +* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA |
| 34 | +* TLS_RSA_WITH_AES_128_GCM_SHA256 |
| 35 | +* TLS_RSA_WITH_AES_256_GCM_SHA384 |
| 36 | +* TLS_RSA_WITH_AES_128_CBC_SHA256 |
| 37 | +* TLS_RSA_WITH_AES_128_CBC_SHA |
| 38 | +* TLS_RSA_WITH_AES_256_CBC_SHA |
| 39 | +* TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA |
| 40 | +* TLS_RSA_WITH_3DES_EDE_CBC_SHA |
| 41 | + |
| 42 | +The supported ECDH Curves are: |
| 43 | + |
| 44 | +* CurveP256 |
| 45 | +* CurveP384 |
| 46 | +* CurveP521 |
| 47 | +* X25519 |
0 commit comments