You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a modern TLS library, s2n-tls aims to provide sane and safe default. The goal of this task is to add TLS1.3 support to the "default" and "default_fips" policies.
Project plan:
Set up a single GeneralBatch job which tests with a default TLS 1.2 policy. This will preserve majority of the current testing behavior when TLS 1.3 becomes the default. However, due to conditional compilation/feature probing (libcrypto, platform), this does sacrifice some code coverage. We consider this an acceptable risk. test: pin static testing policies to numbered versions #4845
This solution was trying to pin current tests to the numbered equivalent of the default policy. However, this could cause a regression of "default" policy tests (tests which actually wanted to test the "default" policy). Since there is no easy way to detect these type of tests, we cannot pin tests to a numbered policy without risking regression.
Pin tests to the old "default" and "default_fips" policies to prevent regression
Security issue notifications
As a modern TLS library, s2n-tls aims to provide sane and safe default. The goal of this task is to add TLS1.3 support to the "default" and "default_fips" policies.
Project plan:
Post MVP:
s2n_config_set_cipher_preferences
after auto gen scriptExtra:
Pin to number policy (failed solution):
This solution was trying to pin current tests to the numbered equivalent of the default policy. However, this could cause a regression of "default" policy tests (tests which actually wanted to test the "default" policy). Since there is no easy way to detect these type of tests, we cannot pin tests to a numbered policy without risking regression.
Disallow explicit use of the "default" policy test: disallow explict use of "default" policy in tests #4750The text was updated successfully, but these errors were encountered: