Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS: add a few extra settings #185

Closed
Robby- opened this issue Feb 15, 2016 · 0 comments · Fixed by #613
Closed

TLS: add a few extra settings #185

Robby- opened this issue Feb 15, 2016 · 0 comments · Fixed by #613
Milestone

Comments

@Robby-
Copy link
Contributor

Robby- commented Feb 15, 2016

In addition to the ssl-ciphers setting I'd like to request that an ssl-protocols setting be added, so that for example protocols such as SSLv2 and SSLv3 can be disabled or only TLSv1.2 be allowed.

Maybe also a setting to disable compression? Or even hardcode it (probably the better option).

Also, since eggdrop acts as a server for its listening ports, a setting like ssl-dhparam for specifying a custom Diffie-Hellman parameters file is probably in order as well. https://weakdh.org/

@Robby- Robby- changed the title TLS protocol selection and cipher selection settings TLS protocol selection settings Feb 15, 2016
@Robby- Robby- changed the title TLS protocol selection settings TLS protocol selection setting Feb 15, 2016
@Robby- Robby- changed the title TLS protocol selection setting TLS: add a few extra settings Mar 23, 2016
@thommey thommey added this to the v1.8.1 milestone Sep 23, 2016
@thommey thommey removed this from the v1.8.1 milestone Dec 15, 2016
@Cizzle Cizzle added this to the v1.9.0 milestone Oct 3, 2018
vanosg pushed a commit that referenced this issue Aug 20, 2019
Found by: Robby-
Patch by: michaelortmann

Adds new config variables ssl-protocols, ssl-ciphers, ssl-dhparam and allows the user to specify (duh) which SSL/TLS protocols, ciphers, and dhparam file to use. Also updated some debug logging to use the actual cipher in use, not the minimum protocol allowed for that cipher.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants