Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Modernize SSL Support #26

Open
joernott opened this issue Jul 20, 2020 · 1 comment
Open

Modernize SSL Support #26

joernott opened this issue Jul 20, 2020 · 1 comment

Comments

@joernott
Copy link

As sysadmin, I am trying to set up my environments as secure as possible. csync2 uses SSL, which is already a good start, however the current implementation does not allow for a few features I would like to set to meet our security standards. I would like to:

  • have the documentation updated to use keys longer than 1024 bits (it works with 4096).
  • be able to configure the file names of the certificate and key in the configuration file
  • check key file and ssl key permissions on application start (e.g. mode 0600, owned by the user running it or mode 0640, owned by root and readably by a group the user running the application if != root)
  • use passwords on the ssl key
  • restrict the protocol to TLSv1.2 or higher
  • restrict the allowed ciphers
  • use a certificate tied to the actual host name instead of sharing the self-signed certificate across hosts
  • validate the CA key chain (I can use a certificate signed by a CA instead of self signed certs, but as the CA certificate is not checked, this is quite irrelevant)
  • use perfect forward secrecy
@zapotah
Copy link

zapotah commented Nov 9, 2021

The error "There was a non-CA certificate in the trusted list:" after debugging the whole thing made me facepalm since that means that csync2 builds a blind trust by itself and simply cannot integrate with an existing PKI...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants