简体   繁体   English

Google App Engine Java是否可以支持TLS> 1.0

[英]Can Google App Engine Java support TLS>1.0

We have a Java app on Google App Engine. 我们在Google App Engine上有一个Java应用程序。 We use Google's custom domains and SSL support. 我们使用Google的自定义域和SSL支持。 A recent security audit has found two issues that we need to resolve relating to the SSL configuration: 最近的安全审核发现,我们需要解决与SSL配置有关的两个问题:

1) The server-side SSL/TLS endpoint is configured to allow weak SSL/TLS cipher suites. 1)服务器端SSL / TLS端点配置为允许弱SSL / TLS密码套件。 Specifically: block ciphers having block size of 112 bits - DES, 3DES and Cipher suites that use block ciphers (eg AES, 3DES) in CBC mode. 具体来说:具有112位块大小的块密码-DES,3DES和在CBC模式下使用块密码(例如AES,3DES)的密码套件。

2) The server-side SSL/TLS endpoint is configured to allow connections using TLS protocol version 1.0 ("TLSv1.0"), which contains known weaknesses 2)服务器端SSL / TLS端点配置为允许使用TLS协议版本1.0(“ TLSv1.0”)进行连接,其中包含已知的弱点

Looking at the App Engine docs, I believe both of these are outside the scope of control we have over the App Engine environment. 通过查看App Engine文档,我相信这两者都超出了我们对App Engine环境的控制范围。 So we cannot change them unless we put a different loadbalancer or SSL termination point in front of App Engine (Maybe CloudFlare, or our own custom instance for example) 因此,除非我们在App Engine前面放一个不同的负载平衡器或SSL终结点(例如,可能是CloudFlare或我们自己的自定义实例),否则我们无法更改它们

My question is, is there any way to control the SSL and TLS settings in App Engine, and if not, is the best alternative to put CloudFlare (or other proxy) in front of it? 我的问题是,有什么方法可以控制App Engine中的SSL和TLS设置,如果没有,是将CloudFlare(或其他代理)放在前面的最佳选择吗?

Or, if there is a reasonable defence/explanation of these security weaknesses from Google, I could use that to defend the current configuration Google has for App Engine apps. 或者,如果可以合理地防御/解释来自Google的这些安全漏洞,则可以使用它来捍卫Google对App Engine应用程序的当前配置。

I heard back from two incredibly helpful GCE engineers, the gist of it is: 我从两位非常有用的GCE工程师那里回信,其要旨是:

"the settings are shared with the servers serving most Google services, balancing client compatibility with modern best practices" “设置与提供大多数Google服务的服务器共享,从而在客户端兼容性和现代最佳实践之间取得了平衡”

"[App Engine] runs our standard GFE configuration" “ [App Engine]运行我们的标准GFE配置”

"While we deprecate what we can, we have to balance that with compatibility. Modern browsers do not allow the configuration of a TLS connection to be downgraded and so supporting older protocols like TLS 1.0 doesn't affect them." “尽管我们不赞成使用,但必须在兼容性与兼容性之间取得平衡。现代浏览器不允许降低TLS连接的配置,因此支持TLS 1.0等较旧的协议不会对其产生影响。”

So basically, it's good enough for Google, and their security teams are making those security choices based on a number of factors - as they see fit they will deprecate the older versions. 因此,基本上,对于Google来说已经足够了,他们的安全团队正在根据多种因素做出这些安全选择-他们认为合适,因此将弃用旧版本。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM