Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new security policy (20250211) #5111

Merged
merged 1 commit into from
Feb 18, 2025
Merged

Conversation

Mark-Simulacrum
Copy link
Contributor

@Mark-Simulacrum Mark-Simulacrum commented Feb 12, 2025

Release Summary:

Adds 20250211, a TLS 1.3-exclusive security policy intended for RFC 9151 migration.

Resolved issues:

n/a

Description of changes:

This PR adds a new security policy that is similar/mix of default_tls13 and rfc9115, but with a minimum protocol support of TLS 1.3. As tested, it is compatible with default_tls13 and rfc9115, making it a middle ground for migration towards rfc9115.

Call-outs:

n/a

Testing:

Added a unit test verifying the compatibility -- I'm hoping it runs in CI since locally I think I don't have TLS 1.3 support for it to run successfully.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@Mark-Simulacrum
Copy link
Contributor Author

2nd commit adds a new cert with a sha384/p-384 key which is compatible with rfc9151.... I can switch that to using the permutations certificate+key (under tests/pems/permutations/ec_ecdsa_p384_sha384) if that's preferred.

tests/pems/gen_self_signed_cert.sh Show resolved Hide resolved
tls/s2n_security_policies.c Outdated Show resolved Hide resolved
@lrstewart lrstewart added this pull request to the merge queue Feb 17, 2025
Merged via the queue into aws:main with commit f2e9181 Feb 18, 2025
46 checks passed
@Mark-Simulacrum Mark-Simulacrum deleted the add-20250211 branch February 18, 2025 00:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants