-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
winhttp: enable TLS 1.2 #4550
winhttp: enable TLS 1.2 #4550
Conversation
src/transports/winhttp.c
Outdated
@@ -786,6 +790,14 @@ static int winhttp_connect( | |||
goto on_error; | |||
} | |||
|
|||
if (!WinHttpSetOption(t->session, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What happens if we are on the unpatched win7? Will this call return an error because the os does not know about TLS1_2? Should we perhaps ignore the return code then?
ed3d02d
to
62c462c
Compare
So to follow up here after further investigation, here's some more data:
I've updated this patch to do a few things:
|
This was implicit, but to be clear: this patch does now explicitly allow libgit2 to connect to github.com on Windows 7 (out of the box) and better. Windows XP and Vista can still connect to hosts that accept non-TLS 1.2, including Bitbucket and Visual Studio Team Services. (Though obviously both those sites will be disabling earlier versions as well and enforcing TLS 1.2.) |
I am afraid this is still better be updated for TLS 1.3.
That is, with this exact patch (without updating to TLS 1.3) the potentially bad behavior is that an unmanifested application on windows 10 might get TLS 1.2 even if 1.3 is available. |
Yeah, that's not ideal. In a perfect world, we'd have a mechanism to query support and not look at version numbers. 🙄 I'll try to get that on somebody's backlog prior to TLS 1.3. |
Note, though, that non-manifested applications report themselves as Windows 8 (NT 6.2). This patch only flips the protocols on for versions prior to 6.2. So Windows 8, 8.1 and 10 are using the system defaults; if they add TLS 1.3 and turn that on as a default, then we should happily work with TLS 1.3. |
Hm, according to the update description, |
You're looking at the text on KB 3140245...? It does indeed say that. I did not realize that until now, I assumed that since Server 2012 is Windows 8 that they would use the same policy here. Let me investigate. |
Windows 8 went out of support a few months before that KB, which is probably why it isn't listed. |
070822d
to
c5c8283
Compare
|
src/transports/winhttp.c
Outdated
|
||
#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 | ||
#define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 0x00000800 | ||
#endif |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hm, some similar constants are defined over here. Perhaps it makes sense to move these there as well?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good eye, thanks @matklad, I had forgotten about that file entirely.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
😢 In fact, those are for mingw/mingw32, which needs the whole lib infrastructure that's in deps/winhttp
.
mingw64 does not use that deps/winhttp
stuff, it has its own headers for winhttp... however, they're outdated. so we actually need to include the constants for mingw64 as well. (sigh.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
so we actually need to include the constants for mingw64 as well. (sigh.)
Hm, I wonder if the headers for msvc on old windows versions (XP and win7) could also be "outdated"? So perhaps the original code with ifndef/define
was actually correct? :-)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yep. Bringing those back.
c5c8283
to
0c1ff2b
Compare
#define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1 0x00000080 | ||
#define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 0x00000200 | ||
#define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 0x00000800 | ||
#define WINHTTP_FLAG_SECURE_PROTOCOL_ALL (WINHTTP_FLAG_SECURE_PROTOCOL_SSL2 | WINHTTP_FLAG_SECURE_PROTOCOL_SSL3 | WINHTTP_FLAG_SECURE_PROTOCOL_TLS1) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you're looking at this and you're thinking "well, that's not all the bits anymore, you just added two!" then you'd be right, but this constant also doesn't actually include all the options! Ha ha. So I'm keeping this aligned with the actual value on Windows.
Just to further pile on to this thread a bit - I was really hoping to avoid hardcoding these values on newer systems that already support TLS 1.2 out of the box by default. My thinking here was that if we did that then this instance of libgit2 would be prevented from automatically including TLS 1.3 support if that were ever added. I looked at version checks, which fail for the reasons @matklad mentioned - Windows is actively trying to subvert using version checks as a means to determine whether things are supported, and so all of the APIs to get version information basically lie in order to make sure that you don't use them. I also looked at So, again, this is not ideal, but there's no option to do this, AFAICT. I've asked around and will revisit this is I've missed something clever here, because allowing the OS to increase the supported protocols would be ideal. |
Include the constants for `WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1` and `WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2` so that they can be used by mingw. This updates both the `deps/winhttp` framework (for classic mingw) and adds the defines for mingw64, which does not use that framework.
For platforms that do not define `WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1` and/or `WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2`.
Versions of Windows prior to Windows 8 do not enable TLS 1.2 by default, though support may exist. Try to enable TLS 1.2 support explicitly on connections. This request may fail if the operating system does not have TLS 1.2 support - the initial release of Vista lacks TLS 1.2 support (though it is available as a software update) and XP completely lacks TLS 1.2 support. If this request does fail, the HTTP context is still valid, and still maintains the original protocol support. So we ignore the failure from this operation.
0c1ff2b
to
5ecb622
Compare
Shipping this and cutting a new release candidate for 0.27.0. Thanks for your help @matklad! |
The rc notably includes a fix for the tls error on windows 7: libgit2/libgit2#4550
Awesome, thanks a lot, @ethomson ! |
Windows 7 does not enable TLS 1.2 by default, though with Software Updates it does support TLS 1.2 when requested. Explicitly enable TLS 1.0-1.2 support, in the case that we're on Windows 7.
This lets libgit2 users on Windows 7 talk to GitHub.com (the website), which now requires TLS 1.2 or better. This assumes that those Windows 7 users have installed the necessary software updates for said TLS 1.2 support. But those updates do not enable TLS 1.2 by default, we must explicitly enable it.