fix(tls): Enable configuration of TLS 1.3 (#20939)
Co-authored-by: Gunnar Aasen <gunnar.r.aasen@gmail.com>pull/20951/head
parent
aa2fcd295f
commit
df46a86326
|
@ -594,7 +594,7 @@
|
||||||
# the default settings from Go's crypto/tls package.
|
# the default settings from Go's crypto/tls package.
|
||||||
# ciphers = [
|
# ciphers = [
|
||||||
# "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
# "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
||||||
# "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
# "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305",
|
||||||
# ]
|
# ]
|
||||||
|
|
||||||
# Minimum version of the tls protocol that will be negotiated. If not specified, uses the
|
# Minimum version of the tls protocol that will be negotiated. If not specified, uses the
|
||||||
|
@ -603,4 +603,4 @@
|
||||||
|
|
||||||
# Maximum version of the tls protocol that will be negotiated. If not specified, uses the
|
# Maximum version of the tls protocol that will be negotiated. If not specified, uses the
|
||||||
# default settings from Go's crypto/tls package.
|
# default settings from Go's crypto/tls package.
|
||||||
# max-version = "tls1.2"
|
# max-version = "tls1.3"
|
||||||
|
|
|
@ -87,6 +87,13 @@ var ciphersMap = map[string]uint16{
|
||||||
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305": tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305": tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305": tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305": tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
|
// TLS 1.3 cipher suites.
|
||||||
|
"TLS_AES_128_GCM_SHA256": tls.TLS_AES_128_GCM_SHA256,
|
||||||
|
"TLS_AES_256_GCM_SHA384": tls.TLS_AES_256_GCM_SHA384,
|
||||||
|
"TLS_CHACHA20_POLY1305_SHA256": tls.TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
// TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator
|
||||||
|
// that the client is doing version fallback. See RFC 7507.
|
||||||
|
"TLS_FALLBACK_SCSV": tls.TLS_FALLBACK_SCSV,
|
||||||
}
|
}
|
||||||
|
|
||||||
func unknownCipher(name string) error {
|
func unknownCipher(name string) error {
|
||||||
|
@ -108,6 +115,8 @@ var versionsMap = map[string]uint16{
|
||||||
"1.1": tls.VersionTLS11,
|
"1.1": tls.VersionTLS11,
|
||||||
"TLS1.2": tls.VersionTLS12,
|
"TLS1.2": tls.VersionTLS12,
|
||||||
"1.2": tls.VersionTLS12,
|
"1.2": tls.VersionTLS12,
|
||||||
|
"TLS1.3": tls.VersionTLS13,
|
||||||
|
"1.3": tls.VersionTLS13,
|
||||||
}
|
}
|
||||||
|
|
||||||
func unknownVersion(name string) error {
|
func unknownVersion(name string) error {
|
||||||
|
|
Loading…
Reference in New Issue