-
Notifications
You must be signed in to change notification settings - Fork 797
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
List of supported cipher suites #217
Comments
Hi @felixhammerl, Thank you! We're glad forge is helping you build really cool applications :).
We should add such a list to the readme. We should leave this issue open until we do so. To give you a quick answer, though, the current version of forge has two builtin supported cipher suites:
We currently only support TLS 1.1 but we're close to having TLS 1.2 support in what will become the 0.7.x branch. Once TLS 1.2 support is finished, we should be able to quickly add support for these cipher suites:
As forge already supports SHA256, SHA384 and AES GCM. The GCM cipher suites are TLS 1.2 only cipher suites, so we must finish 1.2 support before they can be used. There are also several other cipher suites that we plan to support once we complete some other component parts that are on our road map (#203). For example, Diffie-Hellman support would enable us to add forward secrecy cipher suites such as:
We also have ECC support on the roadmap; once added we can add these cipher suites:
That would give us support for the most popular TLS 1.2 cipher suites as well as [perfect] forward secrecy. As we have time to work on the roadmap, we'll push forward to support these cipher suites. |
Thanks for the quick answer, that sounds great! Also, looking forward to ECC support :) |
Hi guys, A question about supported cipher suites, do you have any plan to support Thanks, |
Thank you for the answer. It would be really nice to see SRP support in Forge. |
Closing as a dup of #81 at this point. |
Hi guys,
first of all, thanks for the amazing work from the creators of Whiteout Mail! We use forge in production to terminate IMAPS on the device when native TLS is not an option, e.g. when the TCP traffic is tunnel from IMAP over a TCP<->WebSockets proxy to the device, see our TCPSocket shim. If you're interested, here is a more verbose architecture sketch. Anyway, it works like a charm and I wanted to express my gratitude :)
One question though: Is there a comprehensive list of the supported cipher suites? I was thinking roughly about something like what OpenSSL provides. If yes, I haven't found it.
Have a good one
Felix
The text was updated successfully, but these errors were encountered: