Update security protocol to TLS#24474
Merged
tdcmeehan merged 1 commit intoprestodb:masterfrom Feb 6, 2025
Merged
Conversation
b43a0f5 to
fd07974
Compare
Contributor
|
New release note guidelines. Please remove the manual PR link in the following format from the release note entries for this PR. I have updated the Release Notes Guidelines to remove the examples of manually adding the PR link. |
tdcmeehan
approved these changes
Feb 4, 2025
Contributor
Author
@steveburnett - Updated the Release Notes description. |
Contributor
Author
|
@tdcmeehan - Could you please merge this PR ? |
This was referenced Mar 10, 2025
30 tasks
30 tasks
This was referenced May 6, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
SSLContext result = SSLContext.getInstance("TLS"); // Automatically selects the best supported version
Reference PR : #24436
Motivation and Context
Enhanced Security Protocol to TLS"SSL" uses older and insecure protocols such as SSLv2 and SSLv3, which are vulnerable to attacks like POODLE.
"TLSv1.2" make use of the more modern and secure TLS 1.2 protocol, which mitigates known vulnerabilities in earlier versions of SSL/TLS.
Impact
Backward Compatibility:
If the client does not support TLS 1.2 (e.g., very old systems or devices), the connection may fail.
Test Plan
Contributor checklist
Release Notes
Please follow release notes guidelines and fill in the release notes below.