Status Update
Comments
br...@google.com <br...@google.com> #2
Hi, thanks for this report. I will share this with you about
To define an SSL policy, you specify a minimum TLS version and a profile. The profile selects a set of SSL features to enable in the load balancer. Three Google-managed profiles let you specify the level of compatibility appropriate for your application. A fourth custom profile lets you select SSL features individually.
The SSL policy also specifies the minimum version of the TLS protocol that clients can use to establish a connection. A profile can also restrict the versions of TLS that the load balancer can negotiate.
The current workaround is to use LBS to configure TLS ciphers.
le...@gmail.com <le...@gmail.com> #3
The Workaround of using a load balancer is what we now have in place, however this incurs additional cost and doesn't change the fact that from an out of the box security posture the API Gateway, as a product, is insecure and will fail most security audits in it's current state.
br...@google.com <br...@google.com> #4
Thanks for your message. I understand, given this, this feature request has been forwarded to the API Gateway management team so that they may evaluate it. There is no timeline or implementation guarantee for feature requests. All communication regarding this feature request is to be done here.
Description
Please provide as much information as possible. At least, this should include a description of your issue and steps to reproduce the problem. If possible please provide a summary of what steps or workarounds you have already tried, and any docs or articles you found (un)helpful.
Problem you have encountered:
There is no way to turn on / off specific ciphers on the API gateway requiring fronting with a LB / SSL proxy. This is especially an issue as any security scanning will fail as TLS 1.0, 3DES etc are enabled by default
What you expected to happen:
To have the option to configure either specific ciphers or choose a policy (as is the case with LBs)
Steps to reproduce:
create and configure an API gateway, run a security scan that tests accepted ciphers
Other information (workarounds you have tried, documentation consulted, etc):
Reviewing the API Gateway documentation there is no mention of controls or policies to alter which ciphers are accepted