Skip to content
This repository was archived by the owner on Nov 17, 2020. It is now read-only.

Conversation

dumbbell
Copy link
Contributor

Erlang 22 will introduce TLS 1.3, but at the time of this commit, only the server side is implemented. If the Erlang client requests TLS 1.3, the server will accept but the client will either hang or crash.

So for now, just blacklist TLS 1.3 to avoid any issues, even on the server side, just to be safe.

This should be backported to v3.7.x if accepted.

[#165214130]

…ion is finished

Erlang 22 will introduce TLS 1.3, but at the time of this commit, only
the server side is implemented. If the Erlang client requests TLS 1.3, the
server will accept but the client will either hang or crash.

So for now, just blacklist TLS 1.3 to avoid any issues, even on the
server side, just to be safe.

[#165214130]
Copy link
Contributor

@michaelklishin michaelklishin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds reasonable to me. We can always revisit this in a patch release as new Erlang 22.x releases come out.

@dumbbell dumbbell merged commit 91ae34c into master Apr 11, 2019
@dumbbell dumbbell deleted the blacklist-tls1.3-until-client-implementation-is-finished branch April 11, 2019 12:12
@dumbbell
Copy link
Contributor Author

dumbbell commented Apr 11, 2019

Yes, I agree. Thank you!

I'm waiting for the CI pipeline to test that change and I'll backport it to v3.7.x.

@dumbbell dumbbell added this to the 3.7.15 milestone Apr 11, 2019
@dumbbell
Copy link
Contributor Author

Backported to v3.7.x.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants