mirror of
https://github.com/decke/smtprelay.git
synced 2026-04-25 04:45:52 +03:00
[PR #295] Add configurable TLS profiles for listeners #288
Labels
No labels
bug
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/smtprelay#288
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/decke/smtprelay/pull/295
Author: @StrongWind1
Created: 12/28/2025
Status: 🔄 Open
Base:
master← Head:tls_profile📝 Commits (1)
048d4e9add tls_profile options📊 Changes
3 files changed (+106 additions, -1 deletions)
View changed files
📝
config.go(+1 -0)📝
main.go(+82 -1)📝
smtprelay.ini(+23 -0)📄 Description
This PR adds a new configuration option,
tls_profile, to control the TLS policy used by inboundstarttls://andtls://listeners.Why:
Changes:
tls_profile(default:default)default: Go standard library defaults (recommended for most deployments)modern: TLS 1.3 onlyhardened: TLS 1.2 and TLS 1.3; TLS 1.2 restricted to modern AEAD + ECDHE suites (GCM + ChaCha20). No CBC fallback suites.extended: TLS 1.2 and TLS 1.3; hardened plus additional TLS 1.2 compatibility suites (CBC + RSA key exchange) to support older internal clients.legacy: last resort; enables TLS 1.0+ and all TLS 1.0–1.2 cipher suites exposed by the Go standard library.File updates:
config.gotls_profileoption (flag/config) with accepted values:modern | hardened | default | extended | legacy(default is the default )main.gogetTLSConfig()to apply the selected TLS profilesmtprelay.initls_profileand example usage🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.