You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This updates the Python and openssl versions used in the TLS enforcement
documentation to accomodate for more platforms, such as M1 Macs. Additionally,
a new section has been added with an updated build script to enforce the usage
of TLS V1.3.
Copy file name to clipboardExpand all lines: docs/source/guide/security.rst
+36-3
Original file line number
Diff line number
Diff line change
@@ -192,9 +192,9 @@ To ensure the SDK or CLI doesn't not negotiate for anything earlier than TLS 1.2
192
192
#!/usr/bin/env bash
193
193
set -e
194
194
195
-
OPENSSL_VERSION="1.1.1d"
195
+
OPENSSL_VERSION="1.1.1m"
196
196
OPENSSL_PREFIX="/opt/openssl-with-min-tls1_2"
197
-
PYTHON_VERSION="3.8.1"
197
+
PYTHON_VERSION="3.9.10"
198
198
PYTHON_PREFIX="/opt/python-with-min-tls1_2"
199
199
200
200
@@ -223,6 +223,39 @@ After you run this script, you should be able to use this newly installed versio
223
223
224
224
This should print out::
225
225
226
-
Python 3.8.1
226
+
Python 3.9.10
227
227
228
228
To confirm this new version of Python does not negotiate a version earlier than TLS 1.2, rerun the steps from `Determining Supported Protocols`_ using the newly installed Python version (that is, ``/opt/python-with-min-tls1_2/bin/python3``).
229
+
230
+
Enforcing TLS 1.3
231
+
------------------
232
+
233
+
The process of ensuring the AWS SDK for Python uses no TLS version earlier than TLS 1.3 is the same as the instructions in the `Enforcing TLS 1.2`_ section with some minor modifications, primarily adding the ``no-tls1_2`` flag to the openssl build configuration.
234
+
235
+
The following are the modified build instructions::
0 commit comments