mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[GH-ISSUE #5241] [Feature Request] Implement minimum TLS 1.2+ plus configuration to set higher #4067
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#4067
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ocljlayton on GitHub (Mar 17, 2026).
Original GitHub issue: https://github.com/fatedier/frp/issues/5241
Describe the feature request
[Feature Request] Implement minimum TLS 1.2+ plus configuration to set higher
Default implementation means TLS 1.0 and 1.1, in addition to 1.2+, is enabled. As well as being undesirable on anything lower than TLS 1.2, it gets flagged by security scanners such as Security Scorecard.
It may be possible to override this via Go settings GODEBUG=tls10server=0,tls11server=0, but have not tested this to date.
Preference is introduction of a minTlsversion in the TLS config, defaulted to 1.2+.
Describe alternatives you've considered
It may be possible to override this via Go settings GODEBUG=tls10server=0,tls11server=0, but have not tested this to date.
Affected area
@fatedier commented on GitHub (Mar 17, 2026):
https://github.com/fatedier/frp/releases/tag/v0.55.0
@ocljlayton commented on GitHub (Mar 17, 2026):
Apologies, I will retest. My prior research to raising insinuated that 1.0/1.1 would still be enabled even in the latest Go version, but I suspect that to be wrong now based on your comment. If it is still an issue, I will reopen.