-
-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable the ability to handshake with TLS 1.0 , 1.1 #259
Comments
Also additional improvement is to remove all weak SHA-1 ciphers support from ECDHE , RSA...etc |
Good ideas. Somewhat related: I would like to remove the okHttp dependency and use PRs and discussions welcome. |
How about creating a properties file that lists the disabled ciphers and TLSv1? https://stackoverflow.com/questions/41181696/disabling-tlsv1-0-in-java8 If the properties file approach is acceptable, what's an approved location for the properties file? |
I haven't been working with the code in a while, so can't point you to a definite location right now. But if you make a PR for it, I will gladly review and merge it. |
TLS 1.0 , 1.1 support is deprecated and considered not recommended to support on server TLS level and browser level.
you can test browser through these websites for e.g:
https://browserleaks.com/ssl
https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html
The text was updated successfully, but these errors were encountered: