Skip to content

added stronger TLS ciphers default#6003

Draft
ThyTran1402 wants to merge 2 commits intoopensearch-project:mainfrom
ThyTran1402:feat/add_stronger_tls_default
Draft

added stronger TLS ciphers default#6003
ThyTran1402 wants to merge 2 commits intoopensearch-project:mainfrom
ThyTran1402:feat/add_stronger_tls_default

Conversation

@ThyTran1402
Copy link
Contributor

@ThyTran1402 ThyTran1402 commented Mar 12, 2026

Description

The default TLS configuration allowed weak protocols (TLSv1.1) and cipher suites (CBC-mode, SHA-1 MAC, DHE_DSS, IBM SSL_-prefix) that are considered insecure by modern standards.

  • Old behavior:
    Default protocols: ["TLSv1.3", "TLSv1.2", "TLSv1.1"]
    Default ciphers: 37 entries including CBC-mode, SHA-1 MAC, DHE_DSS, and IBM SSL_-prefix duplicates, based on Chrome 48 / Firefox 42 support
    Outbound connectors defaulted to ["TLSv1.2", "TLSv1.1"]
    Explicitly configuring TLSv1/TLSv1.1 logged a deprecation warning
  • New behavior
    Default protocols: ["TLSv1.3", "TLSv1.2"] (Mozilla Intermediate TLS profile)
    Default ciphers: 10 entries — TLS 1.3 suites + ECDHE+GCM + ECDHE+ChaCha20 for TLS 1.2 only
    All outbound connectors share the same default protocol list via a new SSLConfigConstants.DEFAULT_SSL_PROTOCOLS constant
    Explicitly configuring TLSv1 or TLSv1.1 now causes a hard startup failure

Issues Resolved

#2157

Testing

  • Updated SSLConfigConstantsTest: default protocol assertions updated to reflect removal of TLSv1.1
  • SslParametersTest required no changes: existing assertions already expect ["TLSv1.3", "TLSv1.2"] since the JDK intersection step drops TLSv1.1 on modern JVMs
  • Manual verification: node fails to start when enabled_protocols explicitly includes TLSv1.1, confirming the hard startup error path

Check List

  • New functionality includes testing
  • New functionality has been documented
  • New Roles/Permissions have a corresponding security dashboards plugin PR
  • API changes companion pull request created
  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

Signed-off-by: Thy Tran <58045538+ThyTran1402@users.noreply.github.com>
Signed-off-by: Thy Tran <58045538+ThyTran1402@users.noreply.github.com>
@ThyTran1402 ThyTran1402 marked this pull request as draft March 12, 2026 16:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant