-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove old ciphers #7282
Remove old ciphers #7282
Conversation
3DES ciphers are officially retired because their are vulnerable to the https://sweet32.info/ attack. You can read more about the reasoning here: https://www.cryptomathic.com/news-events/blog/3des-is-officially-being-retired.
I'm all for this change in general, but I'm wondering about timing.
Alternatively, if we don't want to wait, or if we think it's a nicer deprecation cycle, we could trim the list now but with an option to "allow deprecated TLS algos" (I'd avoid letting users specify specific ones just for simplicity). I'd be more OK with putting that in a patch release although deserves some thought. It would be great if we could first emit a warning when using a deprecated cipher before we remove support - I think that would be possible in our TLS handling code on servers/clients but it's more involved. What do you think? Am I too paranoid? Can we argue that although it's a breaking change its warranted in a patch release on security grounds? That would be true for a CVE response or similar but this isn't quite the same thing - it's been considered insecure for years. |
For context:
(Emphasis mine). So it's been deprecated for well over a year already but is not disallowed for another 3 years. I'm super up for killing it as soon as possible though, just want to think what a responsible deprecation cycle would be for us. |
Sorry, mashed wrong button. |
We default to consul/agent/config/default.go Line 72 in b560dae
tls10 , tls11 , tls12 .
|
This is going into 1.8 because it is a breaking change, that we couldn't justify putting into a minor release because there might be customers out there depending on this. This is also why we don't add a way to opt into deprecated ciphers since we feel strongly that we don't want to enable our customers to used known bad ciphers. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
3DES ciphers are officially retired because their are vulnerable to the
https://sweet32.info/ attack. You can read more about the reasoning
here:
https://www.cryptomathic.com/news-events/blog/3des-is-officially-being-retired.
After reading more about ciphers and recommended ciphers here: https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices I cut down the list even more.