Enhance secure connection protocol#24436
Merged
tdcmeehan merged 1 commit intoprestodb:masterfrom Jan 27, 2025
Merged
Conversation
262f5c0 to
18eb68e
Compare
tdcmeehan
approved these changes
Jan 27, 2025
This was referenced Jan 28, 2025
shangm2
pushed a commit
to shangm2/presto
that referenced
this pull request
Jan 30, 2025
6 tasks
This was referenced Mar 7, 2025
jp-sivaprasad
pushed a commit
to jp-sivaprasad/presto
that referenced
this pull request
Mar 10, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
CWE: Weak SSL/TLS protocols should not be used
SSLContext result = SSLContext.getInstance("TLS"); // Automatically selects the best supported versionMotivation and Context
Enhanced Security Protocol to TLS"SSL" uses older and insecure protocols such as SSLv2 and SSLv3, which are vulnerable to attacks like POODLE.
"TLSv1.2" make use of the more modern and secure TLS 1.2 protocol, which mitigates known vulnerabilities in earlier versions of SSL/TLS.
Impact
Backward Compatibility:
If the client does not support TLS 1.2 (e.g., very old systems or devices), the connection may fail.
Test Plan
Contributor checklist
Release Notes
Please follow release notes guidelines and fill in the release notes below.