You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,22 @@
1
1
# Changelog
2
2
3
-
## v1.19.0-dev
3
+
## v1.19.0 (2025-12-08)
4
4
5
5
This release requires Elixir v1.14+ and it bumps the recommended :strong and :compatible SSL/TLS ciphers suite to align with modern security standards, prioritizing TLS 1.3 and 1.2. Support for the insecure TLS 1.0 and 1.1 protocols are removed in accordance with RFC 8996.
6
6
7
+
### Enhancements
8
+
9
+
*[Plug.Router] Allow colon for named segments to be escaped
10
+
*[Plug.SSL] Prioritize TLS 1.3 and 1.2 ciphers
11
+
*[Plug.SSL] Allow excluding redirects based on hosts, paths, or the connection
12
+
*[Plug.Static] Add `:raise_on_missing_only`
13
+
*[Plug.Upload] Partition the uploader to improve performance
Copy file name to clipboardExpand all lines: guides/https.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,8 +83,8 @@ The `:compatible` profile strikes a balance between strong security and broader
83
83
84
84
In addition, both profiles:
85
85
86
-
*Configure the server to choose a cipher based on its own preferences rather than the client's (honor_cipher_order set to true). When specifying a custom cipher list, ensure the list of ciphers is in descending order of preference.
87
-
*Select a list of modern, strong elliptic curves for key exchange, including `:x25519`.
86
+
* Configure the server to choose a cipher based on its own preferences rather than the client's (honor_cipher_order set to true). When specifying a custom cipher list, ensure the list of ciphers is in descending order of preference.
87
+
* Select a list of modern, strong elliptic curves for key exchange, including `:x25519`.
88
88
89
89
Override any of these parameters by specifying custom `:ssl` configuration options.
0 commit comments