-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prevent the application from allowing weak cipher suites #232
Comments
This code is not used in Tchap v2 and EA.
by default hsConfig.tlsCipherSuites is empty except when the app import credentials from legacy config during a migration from Riot to Element.
Approved cipher suites are in the following list :
We should use RESTRICTED_CIPHER_SUITES :
|
not going to be possible: it's not even supported on the client-controlled frontend proxies |
assigned to @Florian14 to check the connexion used to trigger the request to discover the right homeserver on the login screen (/info endpoint of the id server) |
Tested successfully on the |
thx @Florian14 |
After investigation, we have to check with the element-android platform team:
how to remove the "ec_point_formats" extension support on the FOSS version of element-android
how apply the same kind of configuration used to set up the homeserver connection (HomeServerConnectionConfig) to any others connections inside the application. In case of Tchap, on the login screen, a request is triggered to discover the right homeserver to use according to the user's email address (/info endpoint of the id server)
during this task can you please remove the weak cipher suites allowed for Android < 20 (if any)
The text was updated successfully, but these errors were encountered: