-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
deprecated crypto defaults #44
Comments
I typically use sslscan to assess which protocols and ciphers are enabled. Its colored output is not normed but is a good start if you don't know what you're looking at. :) See the screenshots below for examples. As you see, it's easy to spot TLS 1.0 and 1.1 being enabled. :) sslscan ubuntu.comsslscan example.orgOf course, with a snakeoil cert, the SSL certificate won't be considered valid but you shouldn't take that into account, that's expected. |
I feel we should place a hint that this is expected in the submitters template (for awareness) but the check would IMHO live best in the note for Security reviewers that @eslerm mentioned. Let us discuss and conclude the way forward in the next MIR team meeting. |
While security has to check it, submitters and reviewers should be aware and might help to flag something early. Fixes: #44 Signed-off-by: Christian Ehrhardt <christian.ehrhardt@canonical.com> Co-Authored-by: Mark Esler <mark.esler@canonical.com>
I am unsure if this issue belongs here or just as a note for Security reviewers in https://git.launchpad.net/ubuntu-security-tools/tree/audits/workflow.template#n219
Spec FO152 (pending) aims to disable TLS 1.0 and 1.1 by default, as these were deprecated by RFC 8996 in 2021. If a MIR package uses TLS/SSL the owning team should be responsible for spec compliance.
The text was updated successfully, but these errors were encountered: