Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Enable TLS 1.2 support #4677

Closed
dDiverVS opened this issue Jun 12, 2018 · 20 comments
Closed

[Feature Request] Enable TLS 1.2 support #4677

dDiverVS opened this issue Jun 12, 2018 · 20 comments

Comments

@dDiverVS
Copy link

dDiverVS commented Jun 12, 2018

App Details:

Postman for Windows
Version 6.1.3
win32 10.0.15063 / x64

Issue Report:

  1. Did you encounter this recently, or has this bug always been there: Always
  2. Expected behaviour: Mutual SSL certificate based connections should be performed over TLS 1.2 by default, currently requests are based on obsolete SSLv3.

Description of the issue

I am currently trying to test a SOAP based API, this API only supports communications secured by a mutual certificate and TLS 1.2 (SSLv3 is not supported and there is no possibility to enable it).

When doing the same requests with cURL I can successfully get the responses I expect, however I cannot get Postman to work as the connection gets rejected by the endpoint.

@dDiverVS
Copy link
Author

dDiverVS commented Aug 8, 2018

Is there any update on this topic?
It's been a while and I am still unable to automatize my tests in the way I'd like to.

@slaman75
Copy link

slaman75 commented Aug 8, 2018

No update?

@ahmetbombaci-united
Copy link

I cannot make OAuth2.0 authentication process since it is mandatory to use TLS1.2 in the current setup

@nagelm
Copy link

nagelm commented Sep 14, 2018

I also would like to see this

@karolinanm
Copy link

Hi, postman is a great tool but I currently can't use it without TLS support (sslv3 handshake failure)...do you have any idea, when you could implement this feature?

@feratpl
Copy link

feratpl commented Sep 23, 2018

Same issue here. I currently can't use it without TLS support as i am using Self signed Certificate. Because of this issue, i am back to using the Chrome App.
Any updates on this ?

@rolfmadsen
Copy link

+1

@slaman75
Copy link

Do you have an update for when this will be released?

@meatvest
Copy link

I need TLS 1.2 in order for my existing API through Postman to continue. Can you please provide an update?

@FelixButzbach
Copy link

1+

@meatvest
Copy link

What does "1+" or "+1" mean? That you want the same thing, or that the capability will be added?

@FelixButzbach
Copy link

@meatvest it means I also would like this to be implemented or looked into.

@trev
Copy link

trev commented Nov 29, 2018

@prashantagarwal Is this still accurate. e.g Postman still can't connect with TLS1.2?

@FelixButzbach
Copy link

Just wanted to let you know that the error was actually on my side, a missing chain certificate :/ Sorry.

@dDiverVS
Copy link
Author

dDiverVS commented Dec 2, 2018

Hi @trev , I am still experiencing the same issue, I am not sure whether postman does support TLS since some oAuth requests which only support TLS 1.2 are working for me, but it is using by default SSL which should no longer be the case:

Error: write EPROTO 101057795:error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate:c:\projects\electron\vendor\node\deps\openssl\openssl\ssl\s3_pkt.c:1494:SSL alert number 42 101057795:error:1409E0E5:SSL routines:ssl3_write_bytes:ssl handshake failure:c:\projects\electron\vendor\node\deps\openssl\openssl\ssl\s3_pkt.c:659:

@umpc
Copy link

umpc commented Dec 9, 2018

SSLv3 has been known to be vulnerable for over 4 years. This is surprising in late 2018.

@shamasis shamasis assigned shamasis and codenirvana and unassigned a85 Dec 31, 2018
@shamasis
Copy link
Member

This thread has become super confusing by the way. This could also overlap with the feature request of ssl cipher customisability. The OpenSSL error messages are definitely not helpful either. One good soul compiled this gist - https://gist.github.com/64/5b10ad1e2142970fefecdaefa2b339b9 . Is there a nice error message helpful message map that I can get hold of? Anyone? :-p

@jinliming2
Copy link

Google Chrome will deprecate TLS 1.0 and TLS 1.1 in Chrome 72 and will be disabled altogether in Chrome 81.
https://security.googleblog.com/2018/10/modernizing-transport-security.html

@shamasis
Copy link
Member

Hello everyone, I did some digging around this post. It seems that the thread has a number of stakeholders with two kinds of issues: (1) wrong protocol negotiation (2) unable to negotiate a required tls protocol.

In either case, when Postman introduced Native Apps, a majority of this was resolved since all limitations thrown by Chrome was lifted. For the remaining, TTLS 1.2 was supported in all versions of Postman Native app. (See TLS documentation for Node v6 https://nodejs.org/docs/latest-v6.x/api/tls.html (around 2016)

However there are a couple of issues that may give an impression that TLS is not working:

  1. Only a specific subset of cipher suites are used and may have a mismatch during handshake
  2. The default TLS configurations of underlying NodeJS is not modified (or modifiable as of now.) This results in, at times, negotiations of lower TLS versions.
  3. There is not enough debugging information bubbled up to users when TLS related aspects have mismatched expectations.

Additionally, there are a number of factors that influence the negotiations of protocol as outlined at https://nodejs.org/api/tls.html

The end goal would be:

  1. Expose more TLS related info with every response
  2. Allow configuring TLS options so that certain aspects (ciphers, etc) can be force selected.
  3. Do not disallow negotiating older SSL versions (we are not browser, we are an API development tool and as such all debugging aspects should be available) while keeping security warnings, etc.

In case, your API request is not negotiating the right version / cipher, please post additional debugging information by getting the curl command for the request using our code generator in app, but by adding the extra --verbose flag. https://ec.haxx.se/usingcurl-verbose.html

PS: Tracking this in a feature request: #5918

@nerdile
Copy link

nerdile commented Mar 27, 2019

So could someone sum up, for users who want to force a specific TLS version to be used in Postman, what the steps are they would need to take?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests