Skip to content

Move to newer TLS policies on CloudFront #702

@Mark-Simulacrum

Description

@Mark-Simulacrum

Policy docs are here - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html

I suspect we want to choose TLSv1.2_2021, but I don't know if there's a good way to evaluate whether we're cutting anyone off. Anything routed through Fastly should be pretty safe to switch to the newer policy I think.

Our Fastly configuration is currently "TLS v1.2 & TLS v1.3 + 0RTT" across all 4 domains here -- afaict, that's limiting to 1.2 and 1.3 (with optional early data support).1

Current setup:

TLSv1:

  • static.crates.io
  • cloudfront-static.crates.io
  • static.staging.crates.io
  • cloudfront-static.staging.crates.io
  • staging.crates.io
  • crates.io
  • www.crates.io
  • cratesio.com
  • www.cratesio.com
  • www.docs.rs
  • www.docsrs.com
  • docsrs.com
  • arewewebyet.org
  • package.metadata.docs.rs
  • index.crates.io
  • index.staging.crates.io
  • cfp.rustconf.com

TLSv1.1_2016:

TLSv1.2_2021:

  • prev.rust-lang.org
  • forge.rust-lang.org
  • ci-mirrors.rust-lang.org
  • ci-caches.rust-lang.org
  • ci-artifacts.rust-lang.org
  • perf-data.rust-lang.org
  • crates-io-index-temp.rust-lang.org
  • static.docs.rs

Footnotes

  1. HTTP/3 is technically supported but seems to need a different domain (n.sni.global.fastly.net) which we don't CNAME to.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions