Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenSSL: don't change default cipher suites #14655

Conversation

ysbaddaden
Copy link
Contributor

@ysbaddaden ysbaddaden commented Jun 3, 2024

See the below pull request & issue for details (and experimental research). Basically: enforcing a hardcoded string is a bad practice, as the constant will only change with future releases crystal (delaying a security fix to upgrading your application to the latest crystal release or latest master branch) it will override an otherwise securely configured system (oops).

Note: in practice it won't change much, because the list of ciphers wasn't changed for TLS v1.2 and below starting from OpenSSL 1.1 (see #14657).

closes #13686
closes #13727

NOTE: we might want to reconsider #13695 —or not: let the system configuration dictate the behavior.

@straight-shoota straight-shoota added this to the 1.13.0 milestone Jun 3, 2024
@straight-shoota straight-shoota merged commit 42545bc into crystal-lang:master Jun 4, 2024
61 checks passed
@ysbaddaden ysbaddaden deleted the fix/dont-change-openssl-ciphers branch June 6, 2024 11:13
ysbaddaden added a commit that referenced this pull request Jun 6, 2024
Disables the ECDH curve configuration that was limiting the curve selection to less secure curves.

follow up to #14655
closes #9600
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[RFC] Changing the set of ciphers
2 participants