Allow newer TLS versions
ClosedPublic

Authored by nicolasfella on Jan 12 2019, 9:31 PM.

Details

Summary

Instead of mandating TLS V1.0 use 1.0 or later.
BUG: 400338

Test Plan

Phone connects

Diff Detail

Repository
R224 KDE Connect
Lint
Automatic diff as part of commit; lint not applicable.
Unit
Automatic diff as part of commit; unit tests not applicable.
nicolasfella created this revision.Jan 12 2019, 9:31 PM
Restricted Application added a project: KDE Connect. · View Herald TranscriptJan 12 2019, 9:31 PM
Restricted Application added a subscriber: kdeconnect. · View Herald Transcript
nicolasfella requested review of this revision.Jan 12 2019, 9:31 PM

Don't force TLS version at all

nicolasfella edited the summary of this revision. (Show Details)Jan 12 2019, 10:12 PM

What is the default protocol when not set explicitly? Does the default allow SslV2 and/or SslV3?
I liked TlsV1_0OrLater better...

albertvaka accepted this revision.Jan 16 2019, 11:56 AM
This revision is now accepted and ready to land.Jan 16 2019, 11:56 AM

What is the default protocol when not set explicitly? Does the default allow SslV2 and/or SslV3?
I liked TlsV1_0OrLater better...

The default is:
QSsl::SecureProtocols: The default option, using protocols known to be secure; currently behaves similar to TlsV1Ssl3 except denying SSLv3 connections that does not upgrade to TLS.

This revision was automatically updated to reflect the committed changes.