-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add support for disabling TLSv1.0 #1562
Conversation
This looks fine. I merged a similar PR that caused this to need to be rebased. Can you do that and then I'll merge it. |
Many organizations run their applications using in environments that fall into scope of PCI-DSS compliance audits. One of the requirements set out by standard is to migrate to more secure protocols if possible. PCI Security Standards council has advised to migrate away from TLSv1.0 over last few years and recently set a migration deadline of 30 June 2018 (see [1] for more details). Change proposed in this commit gives an user option to disable `TLSv1.0` during bind, while still leaving the `TLSv1.1` and `TLSv1.2` enabled. `SSLv2` and `SSLv3` are permanently disabled (as they should). Default behaviour is not changed if the `no_tls` option is not defined. [1]: https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls
Gentle bump :-) My team would benefit from this. |
Sorry I forgot to comment, this has been rebased in e142b9f and it should be ready to merge |
I'd love to see this fixed, although a more forward-ready implementation would be nice: the ability to list what TLS versions to allow would support disabling TLSv1.1 in the future. |
Why does puma have their own "minissl", instead of using ruby's "openssl" library? |
Tiago,
Ha! I was thinking the same, but after looking into code, the minissl is
just a class name that is used to wrap SSL related functionality. Upon
compilation it still uses OpenSSL. See more details in
#1561
…On Tue, 28 Aug 2018, 19:14 Tiago, ***@***.***> wrote:
Why does puma have their own "minissl", instead of using ruby's "openssl"
library?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#1562 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AALOqJ_57NOYJofy0-zASSw9USBjHwCCks5uVXqNgaJpZM4TYVuw>
.
|
@skrobul I get that, |
Given that:
Rather than add an EDIT: just checked here (GitHub.com), and it is also only using TLSv1.2 |
gentle bump, would be great to have this feature. |
Has there been any updates with this? This would be great if we could disable TLSv1. Also, would be nice for configuration to disable TLSv1.1. |
Update test_binder.rb - skip syntax failure (PR #1562)
Not clear based off of the diff, is it possible to trigger this without explicitly supplying a If not could we add this as a new dsl option? |
Many organizations run their applications using in environments that fall into scope of PCI-DSS compliance audits. One of the requirements set out by standard is to migrate to more secure protocols if possible.
PCI Security Standards council has advised to migrate away from TLSv1.0 over last few years and recently set a migration deadline of 30 June 2018 (see this article for more details).
Change proposed in this commit gives an user option to disable
TLSv1.0
during bind, while still leaving theTLSv1.1
andTLSv1.2
enabled.SSLv2
andSSLv3
are permanently disabled (as they should).Default behaviour is not changed if the
no_tls
option is not defined.Related: #980