Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(sdk): Only allow TLS 1.2 or newer #4647

Merged
merged 2 commits into from
Feb 13, 2025
Merged

Conversation

zecakeh
Copy link
Collaborator

@zecakeh zecakeh commented Feb 8, 2025

As recommended by BCP 195.

It think it's better if the SDK enforces best current security practices by default.

It shouldn't be a problem with rustls that only supports TLS 1.2 and 1.3, but with native-tls it depends on the implementation.

As recommended by BCP 195.

It shouldn't be a problem with rustls that only supports TLS 1.2 and 1.3, but with native-tls it depends on the implementation.

Signed-off-by: Kévin Commaille <[email protected]>
@zecakeh zecakeh requested a review from a team as a code owner February 8, 2025 11:26
@zecakeh zecakeh requested review from jmartinesp and removed request for a team February 8, 2025 11:26
Copy link

codecov bot commented Feb 8, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 85.73%. Comparing base (83dd11e) to head (c02224b).
Report is 44 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #4647   +/-   ##
=======================================
  Coverage   85.72%   85.73%           
=======================================
  Files         292      292           
  Lines       33492    33495    +3     
=======================================
+ Hits        28712    28716    +4     
+ Misses       4780     4779    -1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@Hywan
Copy link
Member

Hywan commented Feb 10, 2025

I think I'm fine with this change. Having a second review from @poljar or @BillCarsonFr would be valuable.

@Hywan
Copy link
Member

Hywan commented Feb 11, 2025

BCP stands for Best Current Practices in case someone was wondering (like I was)

Hywan
Hywan previously requested changes Feb 11, 2025
@@ -11,6 +11,7 @@ All notable changes to this project will be documented in this file.
- The `MediaRetentionPolicy` can now trigger regular cleanups with its new
`cleanup_frequency` setting.
([#4603](https://github.com/matrix-org/matrix-rust-sdk/pull/4603))
- The HTTP client only allows TLS 1.2 or newer, as recommended by BCP 195.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it should be marked as a breaking change. Plus, can you add a link to the PR + a link to the BCP please?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

Signed-off-by: Kévin Commaille <[email protected]>
@zecakeh zecakeh requested a review from Hywan February 11, 2025 14:22
Copy link
Contributor

@poljar poljar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup, makes sense.

@poljar poljar dismissed Hywan’s stale review February 13, 2025 13:21

Comments were addressed, reviewer is off today.

@poljar poljar merged commit 9c9944a into matrix-org:main Feb 13, 2025
41 checks passed
@zecakeh zecakeh deleted the tls-version branch February 13, 2025 13:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants