Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add property for security protocol/version #1465

Merged
merged 2 commits into from
Jan 30, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 20 additions & 1 deletion draft-ietf-taps-interface.md
Original file line number Diff line number Diff line change
Expand Up @@ -1595,7 +1595,9 @@ configuration and actively during a handshake.
The set of security parameters defined here is not exhaustive, but illustrative.
Implementations SHOULD expose an equivalent to the parameters listed below to allow for
sufficient configuration of security parameters, but the details are expected
to vary based on platform and implementation constraints.
to vary based on platform and implementation constraints. Applications MUST be able
to constrain the security protocols and versions that the Transport Services System
will use.

Representation of security parameters in implementations ought to parallel
that chosen for Transport Property names as suggested in {{scope-of-interface-defn}}.
Expand All @@ -1615,6 +1617,23 @@ SecurityParameters := NewDisabledSecurityParameters()
SecurityParameters := NewOpportunisticSecurityParameters()
~~~

### Allowed security protocols

Name:
: allowedSecurityProtocols

Type:
: Implementation-specific enumeration of security protocol names and/or versions.

Default:
: Implementation-specific best available security protocols

This property allows applications to restrict which security protocols and security protocol versions can be used in the protocol stack. Applications MUST be able to constrain the security protocols used by this or an equivalent mechanism, in order to prevent the use of security protocols with unknown or weak security properties.

~~~
SecurityParameters.Set(allowedSecurityProtocols, [ tls_1_2, tls_1_3 ])
~~~

### Certificate bundles

Names:
Expand Down
Loading