Skip to content

Document that server.ssl.cipher and server.ssl.enabled-protocols are not fallbacks used with SSL bundles #43353

@matthew-js-porter

Description

@matthew-js-porter

When configuring server SSL, would it make sense to fallback to the configured server.ssl.ciphers and server.ssl.enabled-protocols properties when the SSL Options for a bundle is not specified?

Given this example:

server:
  ssl:
    ciphers:
      - TLS_CHACHA20_POLY1305_SHA256
    enabled-protocols:
      - TLSv1.3
    bundle: local
    server-name-bundles:
      - server-name: localhost
        bundle: localhost
      - server-name: 127.0.0.1
        bundle: local
      - server-name: other
      - bundle: other

spring:
  ssl:
    bundle:
      jks:
        localhost:
          keystore:
            location: "classpath:test-keystore.jks"
            password: secret
            type: JKS
        local:
          keystore:
            location: "classpath:test-keystore.jks"
            password: secret
            type: JKS
        other:
          keystore:
            location: "classpath:test-keystore.jks"
            password: secret
            type: JKS
          options:
            ciphers:
              - TLS_AES_256_GCM_SHA384
            enabled-protocols:
              - TLSv1.3

I would expect the server to use TLS_CHACHA20_POLY1305_SHA256 and TLSv1.3 for localhost and 127.0.0.1 and TLS_AES_256_GCM_SHA384 for other.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions