I have reported this to misc with subject
Relayd as a HTTPS client
but no one replied.
On snapshot January 7, 2016 amd64
relayd accepts connections using TLS in versions
1.1 and 1.0. It is true even if you just do something like:
relay SendReencryptNormal {
listen on 127.0.0.1 port 7443
forward with tls to destination
}
Manpage tells that by default Relayd uses TLS only
in version 1.2. I have also tested config with explicit
protocol declaration and within that protocol
I specified tls no tlsv1.0 option.
You can test behaviour via:
openssl s_server -key key.pem -cert cert.pem -accept 44330 -www -no_tls1_1
-no_tls1_2
or
openssl s_server -key key.pem -cert cert.pem -accept 44330 -www -tls1
or go to:
https://www.ssllabs.com/ssltest/viewMyClient.html
This is message I posted to misc few days ago:
Hi,
I am using following configuration to connect to TLS websites:
Chromium <-> relayd as a server <-> privo-
xy <-> relayd as a client <-> hostile Internet
I want to focus on relayd as a client in this mailing list thread.
I want to instruct relayd as a client to only connect using TLS versions
1.1 and 1.2
to servers. I don't want TLS version 1.0 and SSL version 3.0. Here is
, I hope relevant, part of my config /etc/relayd.conf:
http protocol certKlient {
tls no cipher-server-preference
tls no tlsv1.0
tls tlsv1.1
tls tlsv1.2
tls ca key "/etc/ssl/private/ca.key" password
"domek" # i will change that in a future
# i don't use that config to my bank account and other
relevant websites
tls ca cert "/etc/ssl/ca.crt"
tls ciphers
"HIGH:!aNULL:!eNULL:!SSLv3:!TLSv1:!DSS:!ECDSA:!RSA:!SHA1:-ECDH:ECDHE:+SHA384:+SHA256"
pass
}
relay SendReencryptNormal {
listen on 127.0.0.1 port 7443
protocol certKlient
forward with tls to destination
}
The problem is that I can type into terminal something like:
openssl s_server -key key.pem -cert cert.pem -accept 44330 -www -no_ssl3
-no_tls1_1 -no_tls1_2
or
openssl s_server -key key.pem -cert cert.pem -accept 44330 -www -tls1
and tell Chromium to go to: https://127.0.0.1:44330/
and it will connect using TLS version 1.0.
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
SSL-Session:
Protocol : TLSv1
Cipher : ECDHE-RSA-AES256-SHA
Session-ID:
Session-ID-ctx: 01000000
Master-Key:
EC6722729D895BEBEDAEDF1964920A6EDEC11674F5FC7F213C1449AE1CA19C393AD9952FBC7B8023ECD7767D72B47D9B
Start Time: 1452113060
Timeout : 300 (sec)
Verify return code: 0 (ok)
I can also go to:
https://www.ssllabs.com/ssltest/viewMyClient.html
and this website also tells me, that I can be connected using TLS version
1.0.
So this is my main problem: I don't want to connect using TLS version
1.0.
What should I add to /etc/relayd.conf to prevent that?