Skip to content

Commit

Permalink
docs: remove mentioning of Cilium's key rotation for IPSec since it d…
Browse files Browse the repository at this point in the history
…oes not apply to WireGuard (#3489)
  • Loading branch information
3u13r authored Nov 21, 2024
1 parent 775ba22 commit 4026752
Showing 1 changed file with 0 additions and 1 deletion.
1 change: 0 additions & 1 deletion docs/docs/architecture/keys.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,6 @@ Each node creates its own [Curve25519](http://cr.yp.to/ecdh.html) encryption key
A node uses another node's public key to decrypt and encrypt traffic from and to Cilium-managed endpoints running on that node.
Connections are always encrypted peer-to-peer using [ChaCha20](http://cr.yp.to/chacha.html) with [Poly1305](http://cr.yp.to/mac.html).
WireGuard implements [forward secrecy with key rotation every 2 minutes](https://lists.zx2c4.com/pipermail/wireguard/2017-December/002141.html).
Cilium supports [key rotation](https://docs.cilium.io/en/stable/security/network/encryption-ipsec/#key-rotation) for the long-term node keys via Kubernetes secrets.

## Storage encryption

Expand Down

0 comments on commit 4026752

Please sign in to comment.