Skip to content

Correctly include TLS1.3 ciphers in the enabled ciphersuites when usi…#10388

Merged
normanmaurer merged 1 commit into4.1from
enabled_ciphers
Jul 2, 2020
Merged

Correctly include TLS1.3 ciphers in the enabled ciphersuites when usi…#10388
normanmaurer merged 1 commit into4.1from
enabled_ciphers

Conversation

@normanmaurer
Copy link
Copy Markdown
Member

…ng BoringSSL

Motivation:

BoringSSL behaves differently then OpenSSL and not include any TLS1.3 ciphers in the returned array when calling SSL_get_ciphers(...). This is due the fact that it also not allow to explicit configure which are supported and which not for TLS1.3. To mimic the behaviour expected by the SSLEngine API we should workaround this.

Modifications:

  • Add a unit test that verifies enabled protocols / ciphers
  • Add special handling for BoringSSL and tls1.3

Result:

Make behaviour consistent

…ng BoringSSL

Motivation:

BoringSSL behaves differently then OpenSSL and not include any TLS1.3 ciphers in the returned array when calling SSL_get_ciphers(...). This is due the fact that it also not allow to explicit configure which are supported and which not for TLS1.3. To mimic the behaviour expected by the SSLEngine API we should workaround this.

Modifications:

- Add a unit test that verifies enabled protocols / ciphers
- Add special handling for BoringSSL and tls1.3

Result:

Make behaviour consistent
@normanmaurer
Copy link
Copy Markdown
Member Author

Found this while working on #10331

Copy link
Copy Markdown
Member

@idelpivnitskiy idelpivnitskiy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Boring they said :)

Copy link
Copy Markdown
Member

@carl-mastrangelo carl-mastrangelo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@normanmaurer normanmaurer added this to the 4.1.51.Final milestone Jul 2, 2020
@normanmaurer normanmaurer merged commit cbe238a into 4.1 Jul 2, 2020
@normanmaurer normanmaurer deleted the enabled_ciphers branch July 2, 2020 19:34
normanmaurer added a commit that referenced this pull request Jul 2, 2020
…ng BoringSSL (#10388)

Motivation:

BoringSSL behaves differently then OpenSSL and not include any TLS1.3 ciphers in the returned array when calling SSL_get_ciphers(...). This is due the fact that it also not allow to explicit configure which are supported and which not for TLS1.3. To mimic the behaviour expected by the SSLEngine API we should workaround this.

Modifications:

- Add a unit test that verifies enabled protocols / ciphers
- Add special handling for BoringSSL and tls1.3

Result:

Make behaviour consistent
Kvicii pushed a commit to Kvicii/netty that referenced this pull request Jul 3, 2020
* '4.1' of github.com:netty/netty:
  Correctly include TLS1.3 ciphers in the enabled ciphersuites when using BoringSSL (netty#10388)
  Fix netty#10378,ResourceLeakDetectorFactory.newResourceLeakDetector(Class, int) ignores  sampling interval (netty#10383)
ihanyong pushed a commit to ihanyong/netty that referenced this pull request Jul 31, 2020
…ng BoringSSL (netty#10388)

Motivation:

BoringSSL behaves differently then OpenSSL and not include any TLS1.3 ciphers in the returned array when calling SSL_get_ciphers(...). This is due the fact that it also not allow to explicit configure which are supported and which not for TLS1.3. To mimic the behaviour expected by the SSLEngine API we should workaround this.

Modifications:

- Add a unit test that verifies enabled protocols / ciphers
- Add special handling for BoringSSL and tls1.3

Result:

Make behaviour consistent
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants