Software Removal | Disroot #2138

Closed
opened 2020-11-25 15:42:01 +00:00 by ghost · 2 comments
ghost commented 2020-11-25 15:42:01 +00:00 (Migrated from github.com)

Description

Suggest removal of the Disroot.

Why I am making the suggestion

TLS1.3 is disabled on disroot.org:443 and disroot:org:465.
In disroot.org:465, TLS1.0 is enabled.

This is not desirable for security.

My connection with the software

Disroot user.

  • [] I will keep the issue up-to-date if something I have said changes or I remember a connection with the software.
## Description Suggest removal of the Disroot. ## Why I am making the suggestion TLS1.3 is disabled on disroot.org:443 and disroot:org:465. In disroot.org:465, TLS1.0 is enabled. This is not desirable for security. ## My connection with the software Disroot user. - [✅] I will keep the issue up-to-date if something I have said changes or I remember a connection with the software.
gary-host-laptop commented 2020-11-25 16:30:10 +00:00 (Migrated from github.com)

I think it would be a smarter idea to contact the sysadmins, inform them of this and help to make their services (which is really odd and rare to find a project that is able to maintain so many of them) better than delisting them... just saying.

I think it would be a smarter idea to contact the sysadmins, inform them of this and help to make their services (which is really odd and rare to find a project that is able to maintain so many of them) better than delisting them... just saying.
dngray commented 2020-11-25 17:03:58 +00:00 (Migrated from github.com)

TLS1.3 is disabled on disroot.org:443 and disroot:org:465.

It supports TLS 1.2 with correct cipher suite preferences. They will likely allow TLS 1.3 soon. Most modern browsers won't in fact use anything lower than TLS 1.2.

In disroot.org:465, TLS1.0 is enabled.

It is, but a cipher suite is set. It will only be used by incoming servers that don't support anything newer.

In the Minimum criteria says:

A server suite preference of TLS 1.2 or later and a plan for Deprecating TLSv1.0 and TLSv1.1.

Though I did notice a few things with this detailed report. I've also emailed them it.

./testssl.sh -t smtps disroot.org:587 |
    aha --black -t "disroot.org (SMTP)"> disroot.org.html

disroot.org_20201126.html.gz

> TLS1.3 is disabled on disroot.org:443 and disroot:org:465. It supports TLS 1.2 with correct cipher suite preferences. They will likely allow TLS 1.3 soon. Most modern browsers won't in fact use anything lower than TLS 1.2. > In disroot.org:465, TLS1.0 is enabled. It is, but a cipher suite is set. It will only be used by incoming servers that don't support anything newer. In the *Minimum* criteria says: > A server suite preference of TLS 1.2 or later and a plan for [Deprecating TLSv1.0 and TLSv1.1](https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/). Though I did notice a few things with this detailed report. I've also emailed them it. ``` ./testssl.sh -t smtps disroot.org:587 | aha --black -t "disroot.org (SMTP)"> disroot.org.html ``` [disroot.org_20201126.html.gz](https://github.com/privacytools/privacytools.io/files/5598158/disroot.org_20201126.html.gz)
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: privacyguides/privacytools.io#2138
No description provided.