Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update SSL params to disable unsafe features and enable TLS version negotiation #5

Merged
merged 1 commit into from
May 31, 2018

Conversation

Lastique
Copy link
Contributor

This patch does the following:

  • Disable TLS compression as it is vulnerable to CRIME.
  • Disable SSLv2 and SSLv3. The latter is disabled unless specifically requested
    on SSL context creation.
  • For all SSL/TLS modes enable TLS version negotiation. This is especially
    useful for TLS as the only TLS version the library currently supports is
    TLS v1.0. Negotiation allows to use newer versions, as supported by OpenSSL.

I realize that this patch changes the meaning of some of the PSSLContext::Method enum values, so this PR is mostly an RFC. If the change is not acceptable in the current form, any directions on how to proceed would be appreciated.

…egotiation.

This patch does the following:

- Disable TLS compression as it is vulnerable to CRIME.
- Disable SSLv2 and SSLv3. The latter is disabled unless specifically requested
  on SSL context creation.
- For all SSL/TLS modes enable TLS version negotiation. This is especially
  useful for TLS as the only TLS version the library currently supports is
  TLS v1.0. Negotiation allows to use newer versions, as supported by OpenSSL.
@willamowius willamowius merged commit 85b9901 into willamowius:master May 31, 2018
@willamowius
Copy link
Owner

Merged. Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants