Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove all TLS 1.0 version pins #2774

Merged
merged 2 commits into from
Mar 5, 2018
Merged

Remove all TLS 1.0 version pins #2774

merged 2 commits into from
Mar 5, 2018

Conversation

bdewater
Copy link
Contributor

@bdewater bdewater commented Mar 5, 2018

Most of these were added years ago as workarounds. They were never revisited to see if gateways had fixed their SSL setup. By removing the pinned version requirement, the highest supported version will be negotiated between the client and the server.

TLS 1.0 is old with known vulnerabilities that require server mitigations to be properly configured. Version 1.2 was released in 2008 and is considered secure with most cipher configurations.

The PCI DSS v3.1 (released March 2015) disallows TLS 1.0 unless existing implementations have applied for an exception. However, this exception is not valid after June 30, 2018. I have verified (with curl -v) that all live and test URLs of the affected gateways support TLS 1.2.

Most of these were added years ago as workarounds. They were never revisited to see if gateways had fixed their SSL setup.

TLS 1.0 is old with known vulnerabilities that require server mitigations to be properly configured. Version 1.2 was released in 2008 and is considered secure with most cipher configurations.

The PCI DSS v3.2 disallows TLS 1.0 unless existing implementations have applied for an exception. However, this exception is not valid after June 30, 2018. I have verified (with `curl -v`) that all live and test URLs of the affected gateways support TLS 1.2.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants