-
Notifications
You must be signed in to change notification settings - Fork 724
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: remove unnecessary RC4 restriction #5170
base: main
Are you sure you want to change the base?
Changes from all commits
1a7d4a1
ba58933
9d460b4
e4b3f55
9dcce87
53a932b
60e0142
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,7 +6,7 @@ | |
from enum import Enum, auto | ||
|
||
from configuration import available_ports | ||
from common import ProviderOptions, Protocols, random_str | ||
from common import Ciphers, ProviderOptions, Protocols, random_str | ||
from fixtures import managed_process # lgtm [py/unused-import] | ||
from providers import Provider, S2N | ||
from utils import invalid_test_parameters, get_parameter_name, to_bytes | ||
|
@@ -17,6 +17,11 @@ | |
SERVER_DATA = f"Some random data from the server:" + random_str(10) | ||
CLIENT_DATA = f"Some random data from the client:" + random_str(10) | ||
|
||
S2N_TEST_POLICIES = { | ||
Protocols.TLS12.value: Ciphers.SECURITY_POLICY_DEFAULT, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. If we update the default policy to support TLS 1.3, I think we'd silently lose TLS 1.2 coverage here. Should the TLS 1.2 policy maybe be pinned? Or maybe assert that TLS 1.2 is negotiated in these tests? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hmmm yeah maybe using the security policy 20210816 is better here? That one doesn't have TLS1.3 cipher suites. |
||
Protocols.TLS13.value: Ciphers.SECURITY_POLICY_DEFAULT_TLS13, | ||
} | ||
|
||
|
||
class MainlineRole(Enum): | ||
Serialize = auto() | ||
|
@@ -62,7 +67,7 @@ def test_server_serialization_backwards_compat( | |
|
||
options = ProviderOptions( | ||
port=next(available_ports), | ||
protocol=protocol, | ||
cipher=S2N_TEST_POLICIES[protocol.value], | ||
insecure=True, | ||
) | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The S2N provider doesn't actually respect curve, most protocols, or most ciphers. It just always sets "test_all" or "test_all_tls12": https://github.com/lrstewart/s2n/blob/25b08ba9acd1745d85a10f56b8e1bd0a686a1683/tests/integrationv2/providers.py#L257-L263
By removing these parameters and setting actual policies, I'm just making the behavior more explicit.