-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove TLS 1.0 as a default SSL protocol #37512
Conversation
The default value for ssl.supported_protocols no longer includes TLSv1 as this is an old protocol with known security issues. Administrators can enable TLSv1.0 support by configuring the appropriate `ssl.supported_protocols` setting, for example: xpack.security.http.ssl.supported_protocols: ["TLSv1.2","TLSv1.1","TLSv1"] Relates: elastic#36021
Pinging @elastic/es-security |
This is currently I will raise a companion PR to deprecate the use of TLS1.0 in 6.x |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Maybe not in the scope of this PR, but do we want to start throwing [WARN]
messages when TLS1
or older is used?
@@ -154,7 +154,7 @@ private XPackSettings() { | |||
} | |||
}, Setting.Property.NodeScope); | |||
|
|||
public static final List<String> DEFAULT_SUPPORTED_PROTOCOLS = Arrays.asList("TLSv1.2", "TLSv1.1", "TLSv1"); | |||
public static final List<String> DEFAULT_SUPPORTED_PROTOCOLS = Arrays.asList("TLSv1.2", "TLSv1.1" ); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: remove extra space
For 6.7 we'll issue a deprecation warning if TLS1.0 is used without being explicitly enabled. I'm not sure we want to issue warnings for things that users intentionally configure. We could but then we probably should warn on |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@elasticmachine run elasticsearch-ci/2 |
@elasticmachine run elasticsearch-ci/2
I can't reproduce this, and I can't see how it's related (but it has failed twice) |
@elasticmachine run elasticsearch-ci/2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
still LGTM
@elasticmachine run elasticsearch-ci/2 |
The default value for ssl.supported_protocols no longer includes TLSv1
as this is an old protocol with known security issues.
Administrators can enable TLSv1.0 support by configuring the
appropriate
ssl.supported_protocols
setting, for example:Relates: #36021