2022-01-26 11:39:34 +00:00
|
|
|
// Package aghtls contains utilities for work with TLS.
|
|
|
|
package aghtls
|
|
|
|
|
2022-09-22 03:58:46 +01:00
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
|
|
|
|
"github.com/AdguardTeam/golibs/log"
|
|
|
|
"golang.org/x/exp/slices"
|
|
|
|
)
|
2022-01-26 11:39:34 +00:00
|
|
|
|
|
|
|
// SaferCipherSuites returns a set of default cipher suites with vulnerable and
|
|
|
|
// weak cipher suites removed.
|
|
|
|
func SaferCipherSuites() (safe []uint16) {
|
2022-01-26 11:47:50 +00:00
|
|
|
for _, s := range tls.CipherSuites() {
|
2022-01-26 11:39:34 +00:00
|
|
|
switch s.ID {
|
|
|
|
case
|
|
|
|
tls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
tls.TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
tls.TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
tls.TLS_RSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
2022-09-22 03:23:39 +01:00
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
2022-01-26 11:39:34 +00:00
|
|
|
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
|
|
|
|
// Less safe 3DES and CBC suites, go on.
|
|
|
|
default:
|
|
|
|
safe = append(safe, s.ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return safe
|
|
|
|
}
|
2022-09-22 03:58:46 +01:00
|
|
|
|
2022-09-22 04:14:43 +01:00
|
|
|
func UserPreferredCipherSuites(ciphers []string) (userCiphers []uint16) {
|
2022-09-22 03:58:46 +01:00
|
|
|
for _, s := range tls.CipherSuites() {
|
|
|
|
if slices.Contains(ciphers, s.Name) {
|
|
|
|
userCiphers = append(userCiphers, s.ID)
|
|
|
|
log.Debug("user specified cipher : %s, ID : %d", s.Name, s.ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return userCiphers
|
|
|
|
}
|