boost::asio TLS settings misconfiguration¶
ID: cpp/boost/tls-settings-misconfiguration
Kind: problem
Security severity: 7.5
Severity: error
Precision: medium
Tags:
- security
- external/cwe/cwe-326
Query suites:
- cpp-security-extended.qls
- cpp-security-and-quality.qls
Click to see the query in the CodeQL repository
Using the TLS or SSLv23 protocol from the boost::asio library, but not disabling deprecated protocols may expose the software to known vulnerabilities or permit weak encryption algorithms to be used. Disabling the minimum-recommended protocols is also flagged.
Recommendation¶
When using the TLS or SSLv23 protocol, set the no_tlsv1
and no_tlsv1_1
options, but do not set no_tlsv1_2
. When using the SSLv23 protocol, also set the no_sslv3
option.
Example¶
In the following example, the no_tlsv1_1
option has not been set. Use of TLS 1.1 is not recommended.
void useTLS_bad()
{
boost::asio::ssl::context ctx(boost::asio::ssl::context::tls);
ctx.set_options(boost::asio::ssl::context::no_tlsv1); // BAD: missing no_tlsv1_1
// ...
}
In the corrected example, the no_tlsv1
and no_tlsv1_1
options have both been set, ensuring the use of TLS 1.2 or later.
void useTLS_good()
{
boost::asio::ssl::context ctx(boost::asio::ssl::context::tls);
ctx.set_options(boost::asio::ssl::context::no_tlsv1 | boost::asio::ssl::context::no_tlsv1_1); // GOOD
// ...
}
References¶
Common Weakness Enumeration: CWE-326.