Skip to content
This repository has been archived by the owner on Sep 11, 2019. It is now read-only.

New Rule: Detect usage of old SSL implementations in the Security Manager #81

Open
jessehouwing opened this issue Jul 3, 2017 · 6 comments
Milestone

Comments

@jessehouwing
Copy link

jessehouwing commented Jul 3, 2017

https://stackoverflow.com/a/28333370/736079

And for .NET 4.5.2 tell people to turn on TLS1.2, as it's turned off by default.

@h3xstream h3xstream modified the milestone: version-2.4.0 Jul 11, 2017
@h3xstream
Copy link
Member

h3xstream commented Aug 18, 2017

I have a big dilemma ..

  • Should we expect that this settings be define before every connections.
  • Somewhere in the initialization.. I am not sure how this could be done..

@jessehouwing
Copy link
Author

jessehouwing commented Aug 18, 2017 via email

@h3xstream
Copy link
Member

Thanks for the precision.
I'll check if I can detect the target version of the project.

@jessehouwing
Copy link
Author

The older projects should be easily detectable by the presence of the TLS12 enum value. Basically it's recommended to not enable anything below TLS11

@jessehouwing
Copy link
Author

Microsoft has actually released a nice doc with good and bad pracices: https://docs.microsoft.com/en-us/dotnet/framework/network-programming/tls

@h3xstream
Copy link
Member

For reference this issue was move to security-code-scan/security-code-scan#10
as Security Guard is no longer active.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants