Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Show TLS/SSL Connection Details #610

Open
gareth-johnstone opened this issue Dec 11, 2024 · 6 comments
Open

[Feature Request] Show TLS/SSL Connection Details #610

gareth-johnstone opened this issue Dec 11, 2024 · 6 comments

Comments

@gareth-johnstone
Copy link

Excellent work with v2, its working way better than v1!

What would be great is if we can see in the meta information of the request, what version of TLS was used for the connection as well as maybe some other SSL/TLS related information?

I was thinking something along the lines of what this service offers: https://www.howsmyssl.com/a/check

{
	"given_cipher_suites": [
		"TLS_GREASE_IS_THE_WORD_0A",
		"TLS_AES_128_GCM_SHA256",
		"TLS_AES_256_GCM_SHA384",
		"TLS_CHACHA20_POLY1305_SHA256",
		"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
		"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
		"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
		"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
		"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
		"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256",
		"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
		"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
		"TLS_RSA_WITH_AES_128_GCM_SHA256",
		"TLS_RSA_WITH_AES_256_GCM_SHA384",
		"TLS_RSA_WITH_AES_128_CBC_SHA",
		"TLS_RSA_WITH_AES_256_CBC_SHA"
	],
	"ephemeral_keys_supported": true,
	"session_ticket_supported": true,
	"tls_compression_supported": false,
	"unknown_cipher_suite_supported": false,
	"beast_vuln": false,
	"able_to_detect_n_minus_one_splitting": false,
	"insecure_cipher_suites": {},
	"tls_version": "TLS 1.3",
	"rating": "Probably Okay"
}

I think mostly the tls_version and given_cipher_suites would be very beneficial.

@gareth-johnstone gareth-johnstone changed the title [Feature Request] Show TLS Connection Version [Feature Request] Show TLS/SSL Connection Details Dec 11, 2024
@tarampampam
Copy link
Owner

Thanks! I believe that, typically, a reverse proxy in front of the app handles TLS, so the webhook tester wouldn't capture the original request's TLS information. Or am I mistaken?

@tarampampam
Copy link
Owner

@gareth-johnstone friendly ping

@gareth-johnstone
Copy link
Author

Thanks! I believe that, typically, a reverse proxy in front of the app handles TLS, so the webhook tester wouldn't capture the original request's TLS information. Or am I mistaken?

@tarampampam Sorry for late response, its been pretty hectic last few days!

You are absolutely right, it would be the reverse proxy that would be picking up that information!

@tarampampam
Copy link
Owner

I believe we have only one option to capture this information - I can add support for TLS certificates in the app, so it will listen on HTTPS instead of HTTP. However, this will require exposing the container port directly to the external world and avoiding the use of any proxy, ingress, etc. That said, is frequently debugging TLS information necessary?

@gareth-johnstone
Copy link
Author

gareth-johnstone commented Dec 16, 2024

I believe we have only one option to capture this information - I can add support for TLS certificates in the app, so it will listen on HTTPS instead of HTTP. However, this will require exposing the container port directly to the external world and avoiding the use of any proxy, ingress, etc.

We have an external firewall so can therefore block most things anyway - maybe be good as an option to do it this way - for most a reverse proxy would probably be fine, but if you want the additional info, use it directly?

That said, is frequently debugging TLS information necessary?

Probably not, its been a recent requirement for some old software where we are using various versions of SSL over a series of webhooks and trying to figure out which is using what was kind of difficult, so thought it would be a great addition - also very useful for debugging services that have disabled TLS1.1 etc.

@tarampampam
Copy link
Owner

Got it, thanks for clarifying. I'll give it some thought!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants