-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add option to configure TLS cipher suites #1193
Comments
Any chance you can define "wonky"? |
Granted I can't really blame them, CBC vs. RC4 is likely choosing which finger you would like blown off. Would rather just disable both, and maybe 3DES while I'm at it because 😿 downgrade attacks are sadmaking. |
For reference https://github.com/golang/go/blob/master/src/crypto/tls/cipher_suites.go#L78-L94 is Go's default cipher ordering I think. |
Note that you can easily disable this on the client side as well. |
"easily" would depend on what TLS client library you were using, and from a compliance PoV it is nice to just knock out everything related to MitM downgrades at once (like you can already do with TLS versions). |
I think Go's defaults are pretty sane here, and they update them with each release based on current thinking in the security community. But I'm happy to look at a PR if one pops up...shouldn't be too bad, since Go has constants that map to the uint16 values. It would just need to basically have a string array and logic to do the mapping. |
Was this closed for an actual reason? |
Some of the Vault issues were closed by mistake from a syncing software. We apologize for the confusion caused. We have reopened the issues that were closed and are investigating the problem that caused this. Again, we are very sorry for the inconvenience. |
+1 I just got this from a pen tester: Sweet32: Birthday attacks on 64-bit block ciphers https://sweet32.info/ nmap --script +ssl-enum-ciphers -p 8200 node1.dev.xxx.corp PORT STATE SERVICE So at the least we need to disable these ciphers: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA |
@rhuddleston if you're willing to do the work it'll get done much faster than leaving it to us :-) if so let me know and we can figure out the design. Shouldn't be too bad. |
@jefferai I have added PR on this if you have a chance to take a look. |
Closed via #2293 |
The default Go cipher configs are a bit wonky, it would be nice to be able to put in a cipher string in the config to override it. I know bupkiss about Go's TLS listener API, but a quick look over of the docs made this seem non-trivial.
The text was updated successfully, but these errors were encountered: