Closed
Bug 1055696
Opened 10 years ago
Closed 10 years ago
http2 enforce secure cipher suite requirement
Categories
(Core :: Networking: HTTP, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 1027720
People
(Reporter: edmailbox, Unassigned)
Details
With Bug 1006804, we fixed the ephemeral key exchange enforcement for HTTP/2.
However, we have not enforce other cipher requirement as per section-9.2.2 of the http2 draft.
I believe AES-GCM and CHACHA20POLY1305 are the only allowed ciphers suite by the draft definition for TLSv1.2.
http://tools.ietf.org/html/draft-ietf-httpbis-http2-13#section-9.2.2
Quote:
The set of TLS cipher suites that are permitted in HTTP/2 is
restricted. HTTP/2 MUST only be used with cipher suites that have
ephemeral key exchange, such as the ephemeral Diffie-Hellman (DHE)
[TLS12] or the elliptic curve variant (ECDHE) [RFC4492]. Ephemeral
key exchange MUST have a minimum size of 2048 bits for DHE or
security level of 128 bits for ECDHE. Clients MUST accept DHE sizes
of up to 4096 bits. HTTP MUST NOT be used with cipher suites that
use stream or block ciphers. Authenticated Encryption with
Additional Data (AEAD) modes, such as the Galois Counter Model (GCM)
mode for AES [RFC5288] are acceptable.
We took care of the AEAD restriction over in bug 1027720.
Status: UNCONFIRMED → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•