Old SSL & TLS deprecation #2296
Replies: 7 comments 10 replies
-
Testing my own systems (incl. WebSocket stuff) as well as common ones (like the mute helper TTS add-on), everything works out of the box so far. |
Beta Was this translation helpful? Give feedback.
-
I've been testing with my Mastodon viewer and everything has been working perfectly fine with it despite it being a more complex item |
Beta Was this translation helpful? Give feedback.
-
Just wondering, what would the process be if there were issues with certain websites/items? A website host is responsible for the version of TLS it uses. YDMS can't change that. I don't see what could be done even if there were issues with specific hosts. Besides, these protocols were disabled in Firefox and Chromium several years ago, websites that still use them are not expected to work anywhere. |
Beta Was this translation helpful? Give feedback.
-
Did a quick test of headless on Linux, appears to work fine starting / joining and connects to SignalR / Resonite API properly |
Beta Was this translation helpful? Give feedback.
-
Rather than moving to fully block the insecure/legacy protocols, would you consider placing the deprecated TLS/SSL setting behind a user configurable toggle in settings? Similar to how browsers like Chrome are handling the ability to enable TLS v1.2 by requiring a user toggle. That way functionality can be restored if lost, but also allows a transitional period where users will be aware that access to legacy protocols will be permanently blocked in the future. I'm all for removing support for weak/deprecated security, but we know that legacy systems still exist. There will be some users who won't participate in the prerelease testing, and rolling out this release may cause a loss of access to some functionality. |
Beta Was this translation helpful? Give feedback.
-
I am all for removing these protocols entirely, but when are you planning to push the removal of these deprecated security protocols to production? Can you provide an estimated timeline? |
Beta Was this translation helpful? Give feedback.
-
Just a heads up, given little activity with this, we assume that there's no major issues discovered while in pre-release channel. We'll be pushing this change out in the next build and monitoring then - if there's some big issues, we can revert pretty quick. The |
Beta Was this translation helpful? Give feedback.
-
Hello everyone!
We are in need of help with some testing for a potentially breaking change. This one should generally not affect anything, but we want to be sure before we push it out.
Build version
TESTING IS OVER
What is being tested
We are removing support for old SSL & TLS protocols (SSL3, TLS 1.0, TLS 1.1). This is due to the protocols being outdated and vulnerable, so they generally shouldn't be used for anything anymore.
With modern .NET runtime (which we are moving towards), the support for these protocols is completely removed as well, which means it won't be possible to support them at all.
How to test
TESTING IS OVER
prerelease
branch and make sure the build updates before you run itSince the build is compatible, please switch to this build if you can and try to daily drive it. Focus on particular areas to see if anything got broken:
If you find something that got broken
Beta Was this translation helpful? Give feedback.
All reactions