You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@qpid.apache.org by "Andrew Stitcher (JIRA)" <ji...@apache.org> on 2019/03/25 20:06:00 UTC

[jira] [Commented] (PROTON-2021) [c] Make SSL/TLS usage more secure by default

    [ https://issues.apache.org/jira/browse/PROTON-2021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16801018#comment-16801018 ] 

Andrew Stitcher commented on PROTON-2021:
-----------------------------------------

In order to maintain backward behaviour compatibility we will maintain the ANONYMOUS peer verification of a client pn_ssl_domain_t created directly with pn_ssl_domain(PN_SSL_MODE_CLIENT) for now. Even though this is secure.

However We will set up the ca certificate store by default for both client and server domains to be the system default trusted ca certificate store as this changes a previous error case into a secure case: Before setting the verify mode for an ssl domain to verify the certificate or the peer name without setting a trusted ca  certificate store would cause an error. Setting a store by default allows this error case to safely use the system default.

> [c] Make SSL/TLS usage more secure by default
> ---------------------------------------------
>
>                 Key: PROTON-2021
>                 URL: https://issues.apache.org/jira/browse/PROTON-2021
>             Project: Qpid Proton
>          Issue Type: Improvement
>          Components: proton-c
>            Reporter: Andrew Stitcher
>            Assignee: Andrew Stitcher
>            Priority: Major
>
> There are some aspects of using TLS with proton-c that are awkward and by default less secure than they could be.
> A good example of this is that it is tricky to set up to verify peer names against the system default ca certificate list. Even though this is carefully set up under many (most?) modern OS distributions.
> Another example is that for a client on the internet verifying peer names is the only safe way to use TLS, but this is not the default.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@qpid.apache.org
For additional commands, e-mail: dev-help@qpid.apache.org