TLSv13Config
saq.sandwich.proto.api.v1.TLSv13Config
Description
A configuration to constrain Compliance, KEX algorithms and ciphersuite for TLS version 1.3.
message TLSv13Config {
// Constraints applied on the choice of algorithms in the configuration.
//
// See [Compliance](Compliance.md).
Compliance compliance = 1;
// The key establishment algorithm (KE) to enforce.
//
// If the remote peer does not support at least one KE algorithm specified
// in this list, the handshake will fail.
// The order of algorithm in KE is in preference order.
repeated string ke = 2;
// Sets TLS 1.3 ciphersuite.
//
// Ciphersuite name must follow IANA name.
//
// Does not apply to BoringSSL.
// See
// https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration
//
// See [RFC 8447 Appendix
// B.4](https://datatracker.ietf.org/doc/html/rfc8446#appendix-B.4) for the
// list of supported cipher suites in TLS 1.3.
//
// If ciphersuite is **not** set, the default ciphersuites listed here are
// used in preference order: | Default 256 bits security ciphersuites |
// |----------------------------------------|
// | TLS_CHACHA20_POLY1305_SHA256 |
// | TLS_AES_256_GCM_SHA384 |
//
// | Default 128 bits security ciphersuites |
// |----------------------------------------|
// | TLS_AES_128_GCM_SHA256 |
repeated string ciphersuite = 3;
// Next id: 4
}
Fields
compliance
Constraints applied on the choice of algorithms in the configuration.
See Compliance.
ke
The key establishment algorithm (KE) to enforce.
If the remote peer does not support at least one KE algorithm specified in this list, the handshake will fail. The order of algorithm in KE is in preference order.
ciphersuite
Sets TLS 1.3 ciphersuite.
Ciphersuite name must follow IANA name.
Does not apply to BoringSSL. See https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration
See RFC 8447 Appendix B.4 for the list of supported cipher suites in TLS 1.3.
If ciphersuite is not set, the default ciphersuites listed here are used in preference order: | Default 256 bits security ciphersuites | |----------------------------------------| | TLS_CHACHA20_POLY1305_SHA256 | | TLS_AES_256_GCM_SHA384 |
Default 128 bits security ciphersuites |
---|
TLS_AES_128_GCM_SHA256 |