Skip to content
This repository has been archived by the owner on Feb 5, 2020. It is now read-only.

Choria broker uses weak ciphers and is vulnerable to the sweet32 attack #75

Closed
vjanelle opened this issue Jan 15, 2020 · 0 comments
Closed

Comments

@vjanelle
Copy link

No description provided.

vjanelle added a commit to vjanelle/go-security that referenced this issue Jan 16, 2020
Mitigation for choria-legacy/go-network-broker#75

Allow runtime list of user selectable ciphers, curves, and default to
sensible values
vjanelle added a commit to vjanelle/go-security that referenced this issue Jan 16, 2020
Mitigation for choria-legacy/go-network-broker#75

Allow runtime list of user selectable ciphers, curves, and default to
sensible values

Helper functionality for setting up configuration
vjanelle added a commit to vjanelle/go-security that referenced this issue Jan 20, 2020
Mitigation for choria-legacy/go-network-broker#75

Allow runtime list of user selectable ciphers, curves, and default to
sensible values

Helper functionality for setting up configuration
@ripienaar ripienaar added this to BACKLOG in Work Board via automation Jan 21, 2020
@ripienaar ripienaar moved this from BACKLOG to TEST in Work Board Jan 21, 2020
@ripienaar ripienaar moved this from TEST to DONE in Work Board Apr 19, 2020
@ripienaar ripienaar removed this from DONE in Work Board Feb 9, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant