diff --git a/pkg/netceptor/tlsconfig.go b/pkg/netceptor/tlsconfig.go index 160361d..21cbce9 100644 --- a/pkg/netceptor/tlsconfig.go +++ b/pkg/netceptor/tlsconfig.go @@ -98,7 +98,7 @@ type TLSServerConfig struct { ClientCAs string `required:"false" description:"Filename of CA bundle to verify client certs with"` PinnedClientCert []string `required:"false" description:"Pinned fingerprint of required client certificate"` SkipReceptorNamesCheck bool `required:"false" description:"Skip verifying ReceptorNames OIDs in certificate at startup" default:"false"` - MinTLS13 bool `required:"false" description:"Set minimum TLS version to 1.3. Otherwise the minimum is 1.2" default:"false"` + MinTLS13 bool `required:"false" description:"Set minimum TLS version to 1.3. Otherwise the minimum is 1.2" default:"true"` } func (cfg TLSServerConfig) PrepareTLSServerConfig(n *Netceptor) (*tls.Config, error) { @@ -176,7 +176,7 @@ type TLSClientConfig struct { InsecureSkipVerify bool `required:"false" description:"Accept any server cert" default:"false"` PinnedServerCert []string `required:"false" description:"Pinned fingerprint of required server certificate"` SkipReceptorNamesCheck bool `required:"false" description:"if true, skip verifying ReceptorNames OIDs in certificate at startup"` - MinTLS13 bool `required:"false" description:"Set minimum TLS version to 1.3. Otherwise the minimum is 1.2" default:"false"` + MinTLS13 bool `required:"false" description:"Set minimum TLS version to 1.3. Otherwise the minimum is 1.2" default:"true"` } func (cfg TLSClientConfig) PrepareTLSClientConfig(n *Netceptor) (tlscfg *tls.Config, pinnedFingerprints [][]byte, err error) {