-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(sdk): Only allow TLS 1.2 or newer #4647
Conversation
As recommended by BCP 195. It shouldn't be a problem with rustls that only supports TLS 1.2 and 1.3, but with native-tls it depends on the implementation. Signed-off-by: Kévin Commaille <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #4647 +/- ##
=======================================
Coverage 85.72% 85.73%
=======================================
Files 292 292
Lines 33492 33495 +3
=======================================
+ Hits 28712 28716 +4
+ Misses 4780 4779 -1 ☔ View full report in Codecov by Sentry. |
I think I'm fine with this change. Having a second review from @poljar or @BillCarsonFr would be valuable. |
BCP stands for Best Current Practices in case someone was wondering (like I was) |
crates/matrix-sdk/CHANGELOG.md
Outdated
@@ -11,6 +11,7 @@ All notable changes to this project will be documented in this file. | |||
- The `MediaRetentionPolicy` can now trigger regular cleanups with its new | |||
`cleanup_frequency` setting. | |||
([#4603](https://github.com/matrix-org/matrix-rust-sdk/pull/4603)) | |||
- The HTTP client only allows TLS 1.2 or newer, as recommended by BCP 195. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it should be marked as a breaking change. Plus, can you add a link to the PR + a link to the BCP please?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
Signed-off-by: Kévin Commaille <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yup, makes sense.
Comments were addressed, reviewer is off today.
As recommended by BCP 195.
It think it's better if the SDK enforces best current security practices by default.
It shouldn't be a problem with rustls that only supports TLS 1.2 and 1.3, but with native-tls it depends on the implementation.