-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Disable HTTP/2 by Default for Webhooks to Mitigate CVE Risks #484
🐛 Disable HTTP/2 by Default for Webhooks to Mitigate CVE Risks #484
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #484 +/- ##
==========================================
- Coverage 38.23% 37.89% -0.35%
==========================================
Files 15 15
Lines 1224 1235 +11
==========================================
Hits 468 468
- Misses 706 717 +11
Partials 50 50 ☔ View full report in Codecov by Sentry. |
e701977
to
2b3a5af
Compare
Ensure HTTP/2 is disabled by default for webhooks. Disabling HTTP/2 mitigates vulnerabilities associated with: - HTTP/2 Stream Cancellation (GHSA-qppj-fm5r-hxr3) - HTTP/2 Rapid Reset (GHSA-4374-p667-p6c8) While CVE fixes exist, they remain insufficient; disabling HTTP/2 helps reduce risks. For details, see: kubernetes/kubernetes#121197
2b3a5af
to
979f29b
Compare
This one we need to backport. |
The CNCF project does not currently backport to previous release versions, but this will be available in future releases of this project. |
// - HTTP/2 Rapid Reset (GHSA-4374-p667-p6c8) | ||
// While CVE fixes exist, they remain insufficient; disabling HTTP/2 helps reduce risks. | ||
// For details, see: https://github.com/kubernetes/kubernetes/issues/121197 | ||
setupLog.Info("disabling http/2") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we indicate that this is for webhooks? We ought to be disabling HTTP/2 for more than just webhooks, and it would be good, to specify it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It will be used for metrics as well when we get both PR merged:
This one and #460
So, how do you think we could make it clearer?
Any ideas?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You're saying that tlsOpts
will be used for multiple Servers? If that's the case, I guess it's ok, but I would like to see a bit more, but we can save that for later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we can shape in a follow after get both merged for sure 👍
Thank you
Given that we just released this, and the installed customer base is small, I agree with this. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
cab110e
Ensure HTTP/2 is disabled by default for webhooks. Disabling HTTP/2 mitigates vulnerabilities associated with:
While CVE fixes exist, they remain insufficient; disabling HTTP/2 helps reduce risks. For details, see: kubernetes/kubernetes#121197