[ 
https://issues.apache.org/jira/browse/PROTON-2021?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16801055#comment-16801055
 ] 

ASF subversion and git services commented on PROTON-2021:
---------------------------------------------------------

Commit 63025898d33bebc7677518c2c103e2f87dc0ea9e in qpid-proton's branch 
refs/heads/master from Andrew Stitcher
[ https://gitbox.apache.org/repos/asf?p=qpid-proton.git;h=6302589 ]

PROTON-2021: [c] Improve TLS default security
- Default ssl to use system certificates unless overridden with
  pn_ssl_domain_set_trusted_ca_db()
- Change pn_ssl_init() so that NULL domain gives a sensible default


> [c] Make SSL/TLS usage more secure by default
> ---------------------------------------------
>
>                 Key: PROTON-2021
>                 URL: https://issues.apache.org/jira/browse/PROTON-2021
>             Project: Qpid Proton
>          Issue Type: Improvement
>          Components: proton-c
>            Reporter: Andrew Stitcher
>            Assignee: Andrew Stitcher
>            Priority: Major
>
> There are some aspects of using TLS with proton-c that are awkward and by 
> default less secure than they could be.
> A good example of this is that it is tricky to set up to verify peer names 
> against the system default ca certificate list. Even though this is carefully 
> set up under many (most?) modern OS distributions.
> Another example is that for a client on the internet verifying peer names is 
> the only safe way to use TLS, but this is not the default.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org

Reply via email to