[
https://issues.apache.org/jira/browse/HBASE-29444?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18004108#comment-18004108
]
Istvan Toth edited comment on HBASE-29444 at 7/9/25 11:48 AM:
--------------------------------------------------------------
On further digging, both netty-tcnative and recent JREs disable anything lower
than TLSv1.2 by default.
For HBase 3.0+ (which requires at least Java17) we can simply rely on the
defaults.
was (Author: stoty):
On further digging, both netty-tcnative and recent JREs disable anything lower
than TLSv1.2 by default.
For HBase 3.0+ we can simply rely on the defaults.
> Default to JRE default TLS protcol list
> ---------------------------------------
>
> Key: HBASE-29444
> URL: https://issues.apache.org/jira/browse/HBASE-29444
> Project: HBase
> Issue Type: Improvement
> Reporter: Istvan Toth
> Assignee: Istvan Toth
> Priority: Major
>
> Currently HBase defaults to TLSv1.2
> ZK now has code to detect and default to to TLSv1.3 if supported.
> Port that code to HBase.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)