Skip to content

feat: add rfc9151 compat policies#5615

Merged
alexw91 merged 11 commits intoaws:mainfrom
jouho:transition-policy
Nov 26, 2025
Merged

feat: add rfc9151 compat policies#5615
alexw91 merged 11 commits intoaws:mainfrom
jouho:transition-policy

Conversation

@jouho
Copy link
Copy Markdown
Contributor

@jouho jouho commented Nov 14, 2025

Goal

Create 4 new security policies that provides a "transition path" for servers to safely migrate to strict RFC9151 requirement

Why

A direct transition from non-RFC9151 compliant policies to RFC9151 compliant policies would break compatibility for clients that don't support RFC9151 TLS options. To safely migrate to RFC9151 compliance, servers need to understand current client behaviors. These transition policies enable this by supporting both legacy TLS (non-RFC9151) options and RFC9151 TLS options, with RFC9151 options being preferred.

How

Four new transition policies are added:

  • security_policy_20251113
  • security_policy_20251114
  • security_policy_20251115
  • security_policy_20251116

These are in order from most restrictive (closest to RFC9151) to most permissive:

Callouts

Testing

Regenerated policy snapshot. Other existing tests continue to pass.

Related

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@github-actions github-actions bot added the s2n-core team label Nov 14, 2025
@jouho jouho marked this pull request as ready for review November 14, 2025 23:18
@alexw91 alexw91 added this pull request to the merge queue Nov 24, 2025
@jouho jouho removed this pull request from the merge queue due to a manual request Nov 24, 2025
@alexw91 alexw91 added this pull request to the merge queue Nov 26, 2025
Merged via the queue into aws:main with commit a29a82a Nov 26, 2025
53 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants