Add default cipher suites for HTTPS transport SSL configuration#4558
Add default cipher suites for HTTPS transport SSL configuration#4558hwupathum merged 1 commit intowso2:4.12.xfrom
Conversation
📝 WalkthroughWalkthroughA new TLS cipher suite configuration property was added to the default configuration file to explicitly specify the allowed cipher suites for HTTPS SSL host connections. Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~3 minutes 🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
PR builder started |
|
PR builder completed |
jenkins-is-staging
left a comment
There was a problem hiding this comment.
Approving the pull request based on the successful pr build https://github.com/wso2/product-is/actions/runs/23780167698
Purpose
Add a default set of secure TLS cipher suites to the HTTPS transport SSL host configuration in `default.json`. This ensures that when users configure HTTPS transport, only strong, modern cipher suites are used by default — including ECDHE, DHE, and TLS 1.3 suites — improving the security posture of the server out of the box without requiring manual configuration.
Implementation
Added the `transport.https.sslHostConfig.properties.ciphers` key to `distribution/kernel/carbon-home/repository/resources/conf/default.json` with a curated list of secure cipher suites:
These suites were selected based on the Mozilla SSL Configuration Generator (Intermediate configuration for Tomcat 11.0.1, Guideline 5.7) to ensure a balance between strong security and broad client compatibility:
Related Issue
wso2/product-is#27335