fix: limit allowed cipher's for TLS 1.2 BED-7722#2540
fix: limit allowed cipher's for TLS 1.2 BED-7722#2540superlinkx merged 1 commit intostage/v8.9.1from
Conversation
|
Howdy! Thank you for opening this pull request 🙇 Your title is formatted correctly but we did not find a matching issue reference. Details: |
|
Caution Review failedFailed to post review comments 📝 WalkthroughWalkthroughThe pull request upgrades the Go toolchain from 1.24 to 1.26.1, migrates the Changes
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes 🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches📝 Generate docstrings
🧪 Generate unit tests (beta)
Comment |
|
@StephenHinck was able to properly validate the ciphers match expectations. We'll do a final pass on the full version of BHCE |
Description
When the application is configured for HTTPS, some insecure ciphers are available by default according to Go's current list. In order to better protect the application when not running behind a load balancer, this change introduces a list of ciphers we want to support
Motivation and Context
Resolves BED-7722
How Has This Been Tested?
Locally tested and verified with
nmap --script ssl-enum-ciphers -p 443 localhostTypes of changes
Checklist:
Summary by CodeRabbit
Release Notes
New Features
Bug Fixes
Chores