Remove TLS 1.0 as a default SSL protocol#37512
Conversation
The default value for ssl.supported_protocols no longer includes TLSv1 as this is an old protocol with known security issues. Administrators can enable TLSv1.0 support by configuring the appropriate `ssl.supported_protocols` setting, for example: xpack.security.http.ssl.supported_protocols: ["TLSv1.2","TLSv1.1","TLSv1"] Relates: elastic#36021
|
Pinging @elastic/es-security |
|
This is currently I will raise a companion PR to deprecate the use of TLS1.0 in 6.x |
jkakavas
left a comment
There was a problem hiding this comment.
LGTM
Maybe not in the scope of this PR, but do we want to start throwing [WARN] messages when TLS1 or older is used?
| }, Setting.Property.NodeScope); | ||
|
|
||
| public static final List<String> DEFAULT_SUPPORTED_PROTOCOLS = Arrays.asList("TLSv1.2", "TLSv1.1", "TLSv1"); | ||
| public static final List<String> DEFAULT_SUPPORTED_PROTOCOLS = Arrays.asList("TLSv1.2", "TLSv1.1" ); |
For 6.7 we'll issue a deprecation warning if TLS1.0 is used without being explicitly enabled. I'm not sure we want to issue warnings for things that users intentionally configure. We could but then we probably should warn on |
|
@elasticmachine run elasticsearch-ci/2 |
|
@elasticmachine run elasticsearch-ci/2 I can't reproduce this, and I can't see how it's related (but it has failed twice) |
|
@elasticmachine run elasticsearch-ci/2 |
@elasticmachine run elasticsearch-ci/2 |
The default value for ssl.supported_protocols no longer includes TLSv1
as this is an old protocol with known security issues.
Administrators can enable TLSv1.0 support by configuring the
appropriate
ssl.supported_protocolssetting, for example:Relates: #36021