-
Notifications
You must be signed in to change notification settings - Fork 846
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature Request] Enable TLS 1.2 support #4677
Comments
Is there any update on this topic? |
No update? |
I cannot make OAuth2.0 authentication process since it is mandatory to use TLS1.2 in the current setup |
I also would like to see this |
Hi, postman is a great tool but I currently can't use it without TLS support (sslv3 handshake failure)...do you have any idea, when you could implement this feature? |
Same issue here. I currently can't use it without TLS support as i am using Self signed Certificate. Because of this issue, i am back to using the Chrome App. |
+1 |
Do you have an update for when this will be released? |
I need TLS 1.2 in order for my existing API through Postman to continue. Can you please provide an update? |
1+ |
What does "1+" or "+1" mean? That you want the same thing, or that the capability will be added? |
@meatvest it means I also would like this to be implemented or looked into. |
@prashantagarwal Is this still accurate. e.g Postman still can't connect with TLS1.2? |
Just wanted to let you know that the error was actually on my side, a missing chain certificate :/ Sorry. |
Hi @trev , I am still experiencing the same issue, I am not sure whether postman does support TLS since some oAuth requests which only support TLS 1.2 are working for me, but it is using by default SSL which should no longer be the case: Error: write EPROTO 101057795:error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate:c:\projects\electron\vendor\node\deps\openssl\openssl\ssl\s3_pkt.c:1494:SSL alert number 42 101057795:error:1409E0E5:SSL routines:ssl3_write_bytes:ssl handshake failure:c:\projects\electron\vendor\node\deps\openssl\openssl\ssl\s3_pkt.c:659: |
SSLv3 has been known to be vulnerable for over 4 years. This is surprising in late 2018. |
This thread has become super confusing by the way. This could also overlap with the feature request of ssl |
Google Chrome will deprecate TLS 1.0 and TLS 1.1 in Chrome 72 and will be disabled altogether in Chrome 81. |
Hello everyone, I did some digging around this post. It seems that the thread has a number of stakeholders with two kinds of issues: (1) wrong protocol negotiation (2) unable to negotiate a required tls protocol. In either case, when Postman introduced Native Apps, a majority of this was resolved since all limitations thrown by Chrome was lifted. For the remaining, TTLS 1.2 was supported in all versions of Postman Native app. (See TLS documentation for Node v6 https://nodejs.org/docs/latest-v6.x/api/tls.html (around 2016) However there are a couple of issues that may give an impression that TLS is not working:
Additionally, there are a number of factors that influence the negotiations of protocol as outlined at https://nodejs.org/api/tls.html The end goal would be:
In case, your API request is not negotiating the right version / cipher, please post additional debugging information by getting the curl command for the request using our code generator in app, but by adding the extra PS: Tracking this in a feature request: #5918 |
So could someone sum up, for users who want to force a specific TLS version to be used in Postman, what the steps are they would need to take? |
App Details:
Issue Report:
Description of the issue
I am currently trying to test a SOAP based API, this API only supports communications secured by a mutual certificate and TLS 1.2 (SSLv3 is not supported and there is no possibility to enable it).
When doing the same requests with cURL I can successfully get the responses I expect, however I cannot get Postman to work as the connection gets rejected by the endpoint.
The text was updated successfully, but these errors were encountered: