Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rpcclient: Explicitly require TLS >= 1.2 for HTTP. #3169

Merged
merged 1 commit into from Jul 27, 2023

Conversation

davecgh
Copy link
Member

@davecgh davecgh commented Jul 26, 2023

This set the TLS config to explicitly require TLS 1.2 as the minimum version for HTTP connections to explicitly match the requirement it imposes for WebSocket connections.

This is technically a noop for the more recent Go releases that are officially supported since TLS 1.2 is the default minimum when acting as a client for those releases, however, it is preferable to be explicit and consistent.

@davecgh davecgh added this to the 1.9.0 milestone Jul 26, 2023
This set the TLS config to explicitly require TLS 1.2 as the minimum
version for HTTP connections to explicitly match the requirement it
imposes for WebSocket connections.

This is technically a noop for the more recent Go releases that are
officially supported since TLS 1.2 is the default minimum when acting as
a client for those releases, however, it is preferable to be explicit
and consistent.
@davecgh davecgh force-pushed the rpcclient_explicit_min_tls_ver branch from 9c43848 to 7f430e7 Compare July 26, 2023 21:14
@davecgh davecgh changed the title rpcclient: Explicitly require TLS 1.2 for HTTP. rpcclient: Explicitly require TLS >= 1.2 for HTTP. Jul 26, 2023
@davecgh davecgh merged commit 7f430e7 into decred:master Jul 27, 2023
2 checks passed
@davecgh davecgh deleted the rpcclient_explicit_min_tls_ver branch July 27, 2023 02:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants