-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Add settings to mark cryptographic algorithms in vpn customer gateways as excluded or obsolete #12193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@ ## main #12193 +/- ## ============================================ - Coverage 17.57% 17.56% -0.01% - Complexity 15550 15655 +105 ============================================ Files 5913 5916 +3 Lines 529427 530159 +732 Branches 64677 64786 +109 ============================================ + Hits 93024 93126 +102 - Misses 425940 426546 +606 - Partials 10463 10487 +24
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
abh1sar
commented
Dec 4, 2025
@blueorangutan package
blueorangutan
commented
Dec 4, 2025
@abh1sar a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress.
blueorangutan
commented
Dec 4, 2025
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 15920
nvazquez
commented
Dec 8, 2025
@abh1sar can you please target this branch against main branch?
714b5b1 to
6bfda8a
Compare
abh1sar
commented
Dec 9, 2025
@blueorangutan package
blueorangutan
commented
Dec 9, 2025
@abh1sar a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress.
blueorangutan
commented
Dec 9, 2025
Packaging result [SF]: ✖️ el8 ✖️ el9 ✖️ debian ✖️ suse15. SL-JID 15958
...obsolete/excluded parameters
abh1sar
commented
Dec 10, 2025
@blueorangutan package
abh1sar
commented
Dec 17, 2025
@blueorangutan package
blueorangutan
commented
Dec 17, 2025
@abh1sar a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress.
blueorangutan
commented
Dec 17, 2025
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 16073
RosiKyu
commented
Dec 19, 2025
@blueorangutan test
blueorangutan
commented
Dec 19, 2025
@RosiKyu a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests
@abh1sar - looks like there's an issue with the smoketets. Could you please have a look?
blueorangutan
commented
Dec 20, 2025
|
[SF] Trillian test result (tid-15030)
|
RosiKyu
commented
Dec 21, 2025
@blueorangutan test
blueorangutan
commented
Dec 21, 2025
@RosiKyu a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests
blueorangutan
commented
Dec 22, 2025
|
[SF] Trillian test result (tid-15038)
|
RosiKyu
commented
Dec 22, 2025
@blueorangutan test
blueorangutan
commented
Dec 22, 2025
@RosiKyu a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests
blueorangutan
commented
Dec 22, 2025
@abh1sar a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress.
abh1sar
commented
Dec 22, 2025
@blueorangutan package
blueorangutan
commented
Dec 22, 2025
@abh1sar a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress.
RosiKyu
commented
Dec 22, 2025
@blueorangutan test
blueorangutan
commented
Dec 22, 2025
@RosiKyu a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests
blueorangutan
commented
Dec 22, 2025
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 16125
blueorangutan
commented
Dec 22, 2025
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 16127
blueorangutan
commented
Dec 23, 2025
|
[SF] Trillian test result (tid-15040)
|
shwstppr
commented
Jan 7, 2026
@blueorangutan package
blueorangutan
commented
Jan 7, 2026
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with no SystemVM templates. I'll keep you posted as I make progress.
blueorangutan
commented
Jan 7, 2026
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ el10 ✔️ debian ✔️ suse15. SL-JID 16295
Uh oh!
There was an error while loading. Please reload this page.
Description
This PR introduces several configuration settings using which an operator can mark certain cryptographic algorithms and parameters as excluded or obsolete for VPN Customer Gateway creation for Site-to-Site VPN.
Cloud providers following modern security frameworks (e.g., ISO 27001/27017) are required to enforce and communicate approved cryptographic standards. CloudStack currently accepts several weak or deprecated algorithms without guidance to users. This PR closes that gap by giving operators explicit control over what is disallowed vs discouraged, improving security posture without breaking existing deployments.
These settings are:
1. vpn.customer.gateway.excluded.encryption.algorithms
2. vpn.customer.gateway.excluded.hashing.algorithms
3. vpn.customer.gateway.excluded.ike.versions
4. vpn.customer.gateway.excluded.dh.group
5. vpn.customer.gateway.obsolete.encryption.algorithms
6. vpn.customer.gateway.obsolete.hashing.algorithms
7. vpn.customer.gateway.obsolete.ike.versions
8. vpn.customer.gateway.obsolete.dh.group
Details :
a. A warning icon is displayed near to it's name with a message to change the obsolete parameter.
b. The Update VPN gateway form shows the setting with a warning to change it.
obsoleteparametersandexcludedparameterscontaining the list of obsolete and excluded parameters that the gateway is using respectively.Update:
Added a periodic task (Interval controlled by a configuration setting - disabled by default) to generate Alerts (Global) and events (per VPN Gateway) for existing VPN gateways that are using obsolete or excluded settings.
Documentation PR : apache/cloudstack-documentation#605
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
Screenshot 2025年12月01日 at 1 55 23 PM Screenshot 2025年12月01日 at 1 55 08 PM Screenshot 2025年12月01日 at 1 54 25 PMAlerts:
Screenshot 2025年12月10日 at 10 50 42 PM
Events:
Screenshot 2025年12月10日 at 10 51 11 PM
How Has This Been Tested?
How did you try to break this feature and the system with this change?