You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TLSv1.1 and older and end of life and not recommended by security professionals. They are not supported in high security environments (such as PCI) and trigger on vulnerability scans.
I noticed there was a discussion in Slack with some pros and cons about different settings, so what is the collective team conclusion about this?
@StackStorm/maintainers especially @nmaludy@punkrokk@blag Are there any security settings which we can take from this and 💯 on-board and which were controversial?
Eg. are there any first take-aways from this to be codified as a PR?
@nmaludy Can we enable TLSv2 and add the syntax to enable TLSv3? We should probably add a note about this to the docs also.
My fear related to defaulting to TLSv3 is that we will end up troubleshooting things for new/existing users due to internal IT policy. And it just breaking things like upgrades in a way that a user may not be able to work around easily due to internal enterprise policies.
Problem
TLSv1.1 and older and end of life and not recommended by security professionals. They are not supported in high security environments (such as PCI) and trigger on vulnerability scans.
Our current nginx settings are:
Solution
We should tighten up the SSL protocols and ciphers in NGINX to be TLSv1.2 and higher along with a tighter set of ciphers.
I'm recommending the following settings:
Places
Some ideas on where we need to make this change (others are welcome):
References
The text was updated successfully, but these errors were encountered: