-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Meta] Support TLS 1.3 #10494
Comments
Related: #12024 |
Hello, looking at the status of this issue it seems TLS 1.3 is still not supported by Logstash, but I found an old PR (June 2020) where TLS 1.3 is mentioned. Could you please confirm if it's supported or not? I come here from the Beats input documentation page that says max TLS version supported is 1.2, but I'm not sure is correct. Thanks! |
I can help with beats input. |
@endorama the story is in general that TLS 1.3 support depends plugin by plugin and also the JDK used (in case of old LS versions or running on older Java 8 versions). for Beats, unfortunately, the @tsaarni thanks for the effort, whatever progress you're able to do I can built upon, what might server as an example to some extent is what we did in TCP input ... as to how much existing Beats option we'll deprecate in favor of a naming similar to the TCP input added options is undecided at this point. |
Closing this issue as Logstash now supports TLS 1.3 |
TLS v1.3 is available since Java
8u262-b10
(AdoptOpenJDK) or8u261-b12
in the Oracle build.https://java.com/en/jre-jdk-cryptoroadmap.html
Logstash 7.15/16 ships with Java 11 and 8.0 will even drop support for Java 8 -> TLS v1.3 could be assumed available.
This issue intends to track all the work towards being confident that Logstash supports TLS v1.3.
Core
Dependencies
scope unknown -> need to review Ruby OpenSSL + C-OpenSSL changes
to allow easy
cipher_suites => ...
support for low level plugins such as the tcp input (requested feature)scope should be relatively simple
Plugins
ES output - Feat: add ssl_supported_protocols option logstash-plugins/logstash-output-elasticsearch#1055 - should work out-of-the box against ES when secured or even restricted to 1.3 only
xpack.security.http.ssl.supported_protocols: TLSv1.3
ssl_supported_protocols
option (default=> ['TLSv1.2', 'TLSv1.3']
)would be nice if the naming prefix would align with planned TLS configuration unification
ES input - Test: against ES with configured TLSv1.3 logstash-plugins/logstash-input-elasticsearch#162 - should work out-of-the box against ES when secured or even restricted to 1.3 only
xpack.security.http.ssl.supported_protocols: TLSv1.3
should be working ->
testing relies on using the Elasticsearch transport Ruby http adapter (need TLSv1.3 in JOpenSSL)(optional) enabled protocol version configurationdoes not make much sense given onlyca_file
TLS configuration is supported atmES filter - should work out-of-the box against ES when secured or even restricted to 1.3 only
Test: against ES with configured TLSv1.3 logstash-plugins/logstash-filter-elasticsearch#154
xpack.security.http.ssl.supported_protocols: TLSv1.3
(optional) enabled protocol version configurationdoes not make much sense given onlyca_file
TLS settingHTTP mixin Feat: add ssl_supported_protocols option logstash-plugins/logstash-mixin-http_client#40
HTTP output Feat: added
ssl_supported_protocols
option logstash-plugins/logstash-output-http#131HTTP Poller input - Manticore based (HTTP mixin)
Feat: added ssl_supported_protocols option logstash-plugins/logstash-input-http_poller#133
HTTP filter - Manticore based (HTTP mixin)
Feat: added ssl_supported_protocols option logstash-plugins/logstash-filter-http#38
TCP input - Netty based for server mode, JOpenSSL in client mode (blocked by JRuby-OpenSSL 1.3 support)
Feat: ssl_supported_protocols (TLSv1.3) + ssl_cipher_suites logstash-plugins/logstash-input-tcp#198
ssl_supported_protocols
plugin is lacking TLS testsssl_cipher_suites
HTTP input Feat: TLSv1.3 support logstash-plugins/logstash-input-http#146
ssl_supported_protocols
) in favor oftls_min_version
/tls_max_version
Feat: review and deprecate ssl protocol/cipher settings logstash-plugins/logstash-input-http#151
TCP output - using JOpenSSL (blocked by JRuby-OpenSSL TLS 1.3 support)
Feat: ssl_supported_protocols (TLSv1.3) logstash-plugins/logstash-output-tcp#47
support for configuring TLS cipher_suites (similar to Beats input)Beats input - Netty based - does only enable TLS 1.2 review plugin for TLS 1.3
Feat: add support for TLSv1.3 logstash-plugins/logstash-input-beats#447
ssl_supported_protocols
(Beats namingssl.supported_protocols
)Feat: review and deprecate ssl protocol/cipher settings logstash-plugins/logstash-input-beats#450
cipher_suites
setting should account for TLS 1.3 suite namesconsider abandoning thecipher_suites
default on recent LS (Java >= 11) to rely on Java defaultsThe text was updated successfully, but these errors were encountered: