freeipa/ipaplatform
Christian Heimes b57c818fab Use only TLS 1.2 by default
TLS 1.3 is causing some trouble with client cert authentication.
Conditional client cert authentication requires post-handshake
authentication extension on TLS 1.3. The new feature is not fully
implemented yet.

TLS 1.0 and 1.1 are no longer state of the art and now disabled by
default.

TLS 1.2 works everywhere and supports PFS.

Related: https://pagure.io/freeipa/issue/7667

Signed-off-by: Christian Heimes <cheimes@redhat.com>
Reviewed-By: Rob Crittenden <rcritten@redhat.com>
2019-07-01 14:55:29 +02:00
..
base For Fedora and RHEL use system-wide crypto policy for mod_ssl 2019-07-01 14:55:29 +02:00
debian Use only TLS 1.2 by default 2019-07-01 14:55:29 +02:00
fedora ipa-client-automount: handle NFS configuration file changes 2019-02-27 21:42:39 +01:00
redhat Use only TLS 1.2 by default 2019-07-01 14:55:29 +02:00
rhel ipa-client-automount: handle NFS configuration file changes 2019-02-27 21:42:39 +01:00
__init__.py Refactor os-release and platform information 2018-08-30 11:37:21 +02:00
_importhook.py Py3: Remove subclassing from object 2018-09-27 11:49:04 +02:00
constants.py Add absolute_import future imports 2018-04-20 09:43:37 +02:00
Makefile.am Use namespace-aware meta importer for ipaplatform 2017-11-15 14:17:24 +01:00
osinfo.py ipatests: remove all occurrences of osinfo.version_id 2019-03-01 08:38:11 +01:00
override.py.in Use namespace-aware meta importer for ipaplatform 2017-11-15 14:17:24 +01:00
paths.py Add absolute_import future imports 2018-04-20 09:43:37 +02:00
services.py Add absolute_import future imports 2018-04-20 09:43:37 +02:00
setup.cfg Port all setup.py to setuptools 2016-10-20 18:43:37 +02:00
setup.py Cleanup shebang and executable bit 2018-07-05 19:46:42 +02:00
tasks.py Add absolute_import future imports 2018-04-20 09:43:37 +02:00