TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Comparison of SSL Labs TLS Scores with Different Go Versions

89 pointsby pythonistover 9 years ago

8 comments

jerfover 9 years ago
I&#x27;d observe that this is testing the <i>default</i> TLS configuration when you ask net&#x2F;http to &quot;Just TLS that connection for me, will you?&quot; with no further details. I imagine almost any version could get to A- if you configured it (PFS seems like it may have been a feature that had to be added), and per selectnull&#x27;s point about Strict Transport Security, you probably should not output that header by default so an A+ with a default configuration would arguably actually be a bad thing.<p>I certainly do not mean this is an unfair question to ask; quite the contrary! (It has been said &quot;defaults matter&quot;, but I&#x27;m really coming around to the idea that even <i>that</i> understates the truth. Options <i>almost</i> don&#x27;t matter. They do. But just barely.) More people should ask this of more code. I just want to make sure non-Go programmers understand what is being said here, that this is the <i>default</i>, not the <i>top capability</i> of the built-in Go TLS stack of those versions.
评论 #11027086 未加载
评论 #11030820 未加载
selectnullover 9 years ago
For those who might not be aware, the highest SSL Labs grade is not A, but A+.<p>To score A+ you must score A and additionally set HSTS headers with long duration (I use 2 years, haven&#x27;t tried with less). For example, with Nginx you use something like:<p><pre><code> add_header Strict-Transport-Security &quot;max-age=63113904;&quot;;</code></pre>
评论 #11026954 未加载
评论 #11027190 未加载
zarothover 9 years ago
It&#x27;s amazing how much this line of code actually makes happen;<p><pre><code> http.ListenAndServeTLS(&quot;:443&quot;, &quot;cert.pem&quot;, &quot;key.pem&quot;, nil)) </code></pre> A full HTTP and TLS stack ready to start dispatching requests to your callbacks. I know there are other languages that can do the same, but I still think it&#x27;s impressive. I&#x27;ve written just a few thousand lines of Go and while I&#x27;m pretty sure I&#x27;m not really &quot;doing it right&quot; I was able to port some decent complexity C# and very easily had all cores processing data at a higher overall rate with the Go code. High level libraries like this, and managed memory makes it almost feel like a scripting language, but with all the advantages of a compiler.<p>Operational question... If you&#x27;re terminating client-side TLS like this, then does that mean either it&#x27;s a single server or you have L4 (or lower) load balancing in front of it? I assume it&#x27;s more common to have haproxy or nginx or something like that in front terminating TLS, with the API servers sitting behind.
LinuxBenderover 9 years ago
In addition to SSL Labs, I also find this useful for things that are not exposed to the internet. (firewalled)<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;drwetter&#x2F;testssl.sh" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;drwetter&#x2F;testssl.sh</a><p>It only depends on OpenSSL and bash. I find it very useful for reviewing our systems before they go live.
评论 #11027514 未加载
ck2over 9 years ago
Hmm what is HSTS preloading.<p>I have to catchup on the latest TLS stuff every few months.<p>So what is the default preferred cipher suite string for Go 1.6 ? I worked out my own a couple years ago and it still gets an A rating on SSL Labs
评论 #11031061 未加载
cypharover 9 years ago
I wonder what the results would be for 1.5.2 (the version which had the bug in key generation). Has anyone check this? If not, I&#x27;ll do it when I have time later today.
评论 #11030888 未加载
cypharover 9 years ago
Heh. Looks like the cipher suite options are outdated for this site (so it probably wouldn&#x27;t pass an SSLabs test).
yegleover 9 years ago
The HTTPS connection of the website (aoeus.com) uses SHA-1.
评论 #11031070 未加载