Closed nkinkade closed 5 years ago
Double-check that this is disabled on the new platform. Will not fix on the old platform.
@pboothe: Did we decide that we don't care about whether NDT (or other experiments) use old, insecure algorithms, since none of the data will be sensitive?
The choice of TLS version supported by an experiment should be up to the experimenter. As long as platform services are up to date, then M-Lab should be happy. With the lone exception of NDT, because we took over that tool when it got abandoned.
I think that ndt-server should support old insecure versions of TLS. I don't think it should prefer them. I don't feel strongly enough about this to change the Go defaults myself, but I am definitely willing to review code that opens it up to more old algorithms. The old NDT server definitely supported encryption algorithms that people no longer recommend as secure, and that was fine because it did not transmit anything of importance. The bytes it transmitted were either random or publicly archived or both.
Sounds reasonable. This is a non-issue then. Closing.
The ndt-server should probably disable SSLv3, as it's old and not considered fully secure.
While NDT does not send any sensitive data, we may like to disabled this protocol simply as a matter of good form.