Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add MD5 and SHA-1 server signatures #514

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

davidben
Copy link

These correspond to the configurations deprecated by RFC 9155. I've marked MD5 as "bad" because it really should have been out of clients by now. I've marked SHA-1 as "dubious" for now because it's analogous to TLS 1.0/1.1, and clients still support it for now (but hopefully not for much longer).

(I just copied the existing configuration for the cipher suite pages. Not positive if I've done it right.)

These correspond to the configurations deprecated by RFC 9155. I've
marked MD5 as "bad" because it really should have been out of clients by
now. I've marked SHA-1 as "dubious" for now because it's analogous to
TLS 1.0/1.1, and clients still support it for now (but hopefully not for
much longer).
@davidben
Copy link
Author

@christhompson

Copy link
Collaborator

@christhompson christhompson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The good news this should work (with two small syntax fixes), and it's an easy thing to maintain (since it doesn't require new certs). The bad news is the ssl_conf_command was added in Nginx 1.19.4 and the current server... is Nginx 1.10.3. So landing this will be blocked on me completing the server upgrade after all.

nginx-includes/tls-md5-signature.conf Outdated Show resolved Hide resolved
nginx-includes/tls-sha1-signature.conf Outdated Show resolved Hide resolved
@davidben
Copy link
Author

So landing this will be blocked on me completing the server upgrade after all.

Oof. In the likely event the upgrade makes it impossible to sign MD5, that's no big deal. I don't think any browser supports that anyway. I just added it for completeness.

Clearly we should fork the Go TLS stack and write a custom TLS terminator to sit in front of NGINX... :-)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants