-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make CE HTTPS use current Mozilla recommendations #4568
Conversation
https_opts = [ | ||
port: https_port, | ||
ip: listen_ip, | ||
cipher_suite: :compatible, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Plug's compatible
cipher suite is a bit outdated: elixir-plug/plug#1143
config/runtime.exs
Outdated
transport_options: [socket_opts: [log_level: :warning]] | ||
] | ||
# the following configuration is based on https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29 | ||
# except we make the server choose the cipher preference |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Because that's what https://plausible.io (or rather Bunny CDN) is doing.
config/runtime.exs
Outdated
~c"TLS_CHACHA20_POLY1305_SHA256", | ||
# Mozilla recommended cipher suites (TLS 1.2) | ||
~c"ECDHE-ECDSA-AES128-GCM-SHA256", | ||
~c"ECDHE-RSA-AES128-GCM-SHA256", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
RSA ones can be removed since certbot generates ECDSA keys by default, and we (and site_encrypt) don't provide any options to configure it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes
This PR continues #4491 and makes CE HTTPS follow Mozilla recommendations for "Intermediate" compatibility.
ChatGPT says this configuration suite would cover approximately 95-98% of global web clients.
It also excludes iPhones with iOS 8 and below.
Compared to Plug's
compatible
suite (used in #4491), this configuration:Current SSL Labs results: https://www.ssllabs.com/ssltest/analyze.html?d=who.copycat.fun
Compared to Plausible Cloud, this configuration: