← Back to team overview

linuxdcpp-team team mailing list archive

[Bug 1308290] Re: Require TLS 1.2 connections for ADCS

 

For reference, to test connecting to different TLS versions:
TLS 1.0: openssl s_client -connect host:port -tls1 -no_tls1_1 -no_tls1_2
TLS 1.1: openssl s_client -connect host:port -tls1_1
TLS 1.2: openssl s_client -connect host:port -tls1_2

As far as I can tell,
http://sourceforge.net/p/dcplusplus/code/ci/3f410c13dfcf3b15105cabbc39f7e0eacb0bb038/
does follow OpenSSL's documented API.

https://www.openssl.org/docs/ssl/SSL_CTX_new.html states "The list of
protocols available can later be limited using the SSL_OP_NO_SSLv2,
SSL_OP_NO_SSLv3, SSL_OP_NO_TLSv1 options of the SSL_CTX_set_options() or
SSL_set_options() functions."

https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html states that
SSL_OP_NO_TLSv1 means "Do not use the TLSv1 protocol."

http://openssl.6102.n7.nabble.com/Selecting-TLSv1-2-only-protocol-td48296.html states that:
options = SSL_OP_NO_TLSv1|SSL_OP_NO_TLSv1_1 |SSL_OP_NO_SSLv2; 
options |= SSL_OP_NO_SSLv3; 

Selects TLS v1.2 or newer.

-- 
You received this bug notification because you are a member of
Dcplusplus-team, which is subscribed to DC++.
https://bugs.launchpad.net/bugs/1308290

Title:
  Require TLS 1.2 connections for ADCS

Status in DC++:
  In Progress

Bug description:
  The same patch attached can be found at
  http://pastie.org/pastes/8760328 from two months ago. It's the
  resolution to https://dcpp.wordpress.com/2013/09/20/beast-crime-
  breach-and-lucky-13-assessing-tls-in-adcs/

  This is meant as a trial patch: easy to add, and if it causes
  irresolvable problems, easy to remove without affecting much else.

To manage notifications about this bug go to:
https://bugs.launchpad.net/dcplusplus/+bug/1308290/+subscriptions


References