-
Notifications
You must be signed in to change notification settings - Fork 305
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use TLSv1 by default #259
Use TLSv1 by default #259
Conversation
Why not go straight to TLS 1.2? |
Not everybody can afford running TLS 1.2. For example, if you have .NET clients using RabbitMQ, they would have to run .NET 4.5. JVM-based apps will have to use JDK 7. And so on. |
I understand that different clients can still use earlier TLS versions but as far as recent developments (specifically POODLE) go, there is not a lot of upside to using TLS 1.2. |
TLS 1.0 is vulnerable to the beast attack, 1.1 and 1.2 is not. Bunny could still default to 1.2, even if old versions of .net or jvm doesn't support it, right? On Wednesday 22 October 2014 at 02:15, Michael Klishin wrote:
|
Why is the ssl_version even being set explicitly? |
👍 @dangerp |
@carlhoerberg @michaelklishin see my proposed solution in #261 |
@dangerp Ruby's OpenSSL is virtually undocumented, that's why I wasn't aware of the TLSv1 preference. Thank you. |
I entirely understand. I've been doing a ton of digging the past few days auditing all of the libraries that we have that use SSL, and I started out with the same solution as yours. Took me a while to figure out what the ruby OpenSSL library was doing, and even longer to figure out what the For those reading this too lazy to open the link above:
This means that the server gets to decide which protocol to use. If the server supports TLSv1.2, then that is what it will likely choose to respond with. |
Fixes #258.