b655586 Don't hard-code client's TLS versions and ciphers

Authored and Committed by cheimes 4 years ago
    Don't hard-code client's TLS versions and ciphers
    
    Client connections no longer override TLS version range and ciphers by
    default. Instead clients use the default settings from the system's
    crypto policy.
    
    Minimum TLS version is now TLS 1.2. The default crypto policy on
    RHEL 8 sets TLS 1.2 as minimum version, while Fedora 31 sets TLS 1.0 as
    minimum version. The minimum version is configured with OpenSSL 1.1.1
    APIs. Python 3.6 lacks the setters to override the system policy.
    
    The effective minimum version is always TLS 1.2, because FreeIPA
    reconfigures Apache HTTPd on Fedora.
    
    Fixes: https://pagure.io/freeipa/issue/8125
    Signed-off-by: Christian Heimes <cheimes@redhat.com>
    Reviewed-By: Rob Crittenden <rcritten@redhat.com>
    Reviewed-By: Thomas Woerner <twoerner@redhat.com>
    Reviewed-By: Rob Crittenden <rcritten@redhat.com>
    Reviewed-By: Thomas Woerner <twoerner@redhat.com>
    
        
file modified
+13 -3
file modified
+7 -5
file modified
+21 -13