Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit bba486f

Browse files
committed
Base the default SSL ciphers on DEFAULT instead of ALL
It's better to start from what the OpenSSL people consider a good default and then remove insecure things (low encryption, exportable encryption and md5 at this point) from that, instead of starting from everything that exists and remove from that. We trust the OpenSSL people to make good choices about what the default is.
1 parent 4eebf13 commit bba486f

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

src/backend/utils/misc/guc.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3056,7 +3056,7 @@ static struct config_string ConfigureNamesString[] =
30563056
},
30573057
&SSLCipherSuites,
30583058
#ifdef USE_SSL
3059-
"ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH",
3059+
"DEFAULT:!LOW:!EXP:!MD5:@STRENGTH",
30603060
#else
30613061
"none",
30623062
#endif

src/backend/utils/misc/postgresql.conf.sample

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@
7979

8080
#authentication_timeout = 1min # 1s-600s
8181
#ssl = off # (change requires restart)
82-
#ssl_ciphers = 'ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH' # allowed SSL ciphers
82+
#ssl_ciphers = 'DEFAULT:!LOW:!EXP:!MD5:@STRENGTH' # allowed SSL ciphers
8383
# (change requires restart)
8484
#ssl_renegotiation_limit = 512MB # amount of data between renegotiations
8585
#ssl_cert_file = 'server.crt' # (change requires restart)

0 commit comments

Comments
 (0)