Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[RFC 8446] Add support for TLS 1.3 #388

Closed
alexw91 opened this issue Feb 24, 2017 · 41 comments
Closed

[RFC 8446] Add support for TLS 1.3 #388

alexw91 opened this issue Feb 24, 2017 · 41 comments

Comments

@alexw91
Copy link
Contributor

alexw91 commented Feb 24, 2017

Placeholder Issue to track all of the work that we need to do for adding support for TLS 1.3

@raycoll
Copy link
Contributor

raycoll commented Feb 24, 2017

Using milestone instead.

@raycoll raycoll closed this as completed Feb 24, 2017
@infinity0
Copy link

Link to the milestone: https://github.com/awslabs/s2n/milestone/1

It's currently empty, could we get a brief update for those of us following from outside the project? Thanks in advance.

@alexw91
Copy link
Contributor Author

alexw91 commented Apr 17, 2018

We're working on it. We'll start opening Pull Requests for TLS 1.3 once the RFC is finalized and out of draft mode.

@alexw91
Copy link
Contributor Author

alexw91 commented Aug 11, 2018

Looks like TLS 1.3 is now officially a RFC: https://www.rfc-editor.org/info/rfc8446 😄

@smartleoyu
Copy link

Any timeline for the TLS 1.3 release from s2n?

@colmmacc
Copy link
Contributor

colmmacc commented Aug 15, 2018

We have a goal to ship it in 2018, and we're happy for help! Some TLS1.3 work is already in progress, and there are even commits made already that are preparatory, such as re-organizing the core state machine and adding HKDF.

The reasons for waiting are a combination of AWS policy, where we tend to avoid running experimental protocols in production, and waiting until a version of OpenSSL is ready so that end-to-end compatibility and regression tests with another implementation can be present.

@smartleoyu
Copy link

Thanks for the prompt reply. Is it possible to try out a beta while waiting for the final release? Maybe this is against the AWS policy but it would facilitate some implementation work that relies on s2n.

@alexw91 alexw91 changed the title Add support for TLS 1.3 [RFC 8446] Add support for TLS 1.3 Aug 16, 2018
@alexw91
Copy link
Contributor Author

alexw91 commented Sep 19, 2018

I finished reading all ~160 pages of the TLS 1.3 RFC last week and highlighted all the parts that are new or changed from TLS 1.2 as I was reading it, but I haven't had time yet to sit down and create GitHub Issues for everything yet.

I'm planning on going through my highlights and creating GitHub issues for all the TLS 1.3 work sometime soon (hopefully in the next week).

Edit: Github Issues created here.

@bestis
Copy link

bestis commented Jul 26, 2019

We have a goal to ship it in 2018
waiting until a version of OpenSSL is ready

So what's the situation with this? Almost year has gone by and nothing has happened to tls1.3 support? It would be nice to get less round-trips to lessen the time to first byte.

@colmmacc
Copy link
Contributor

We're working on it now as it happens :) This did get deprioritized a bit, based on a mix of things. In short: we wanted to perform more analysis of TLS1.3 (and in fact found a small issue) and some other priorities over took it.

@chris-wood
Copy link

@colmmacc If I may, what was the "small issue"?

@alexw91
Copy link
Contributor Author

alexw91 commented Aug 5, 2019

I believe the issues Colm was referring to were the following:

@torntrousers
Copy link

Any news on the TLS 1.3 progress?

@demonfoo
Copy link

demonfoo commented Nov 8, 2019

I'd very much like to know the same.

@zaherd
Copy link

zaherd commented Nov 8, 2019

We are doing good progress on TLS 1.3. You can track our effort by checking this project https://github.com/awslabs/s2n/projects/6

@balthazar
Copy link

For people interested, the new project seems to be https://github.com/awslabs/s2n/projects/9

@demonfoo
Copy link

demonfoo commented Jul 9, 2020

Will that project be sufficient to actually roll out working TLSv1.3 in AWS ALBs, CloudFront, et al.? Considering that the prior project is long done, and earlier in this thread the claim was that it would be out in 2018 (which, unless one of the tickets includes time travel, obvs is not happening)...

@iamvajid
Copy link

We are in August 2020 :) Any light on the TLSv1.3 release ?

@eXeDK
Copy link

eXeDK commented Aug 25, 2020

I would check the projects here: https://github.com/awslabs/s2n/projects

@bharel-lmi
Copy link

Is there an estimated ETA for ALB TLS 1.3 support?
Thanks.

@dougch
Copy link
Contributor

dougch commented Jan 20, 2021

Is there an estimated ETA for ALB TLS 1.3 support?
Thanks.

We've broken up TLS1.3 into sub-projects, see what has been closed out here. Currently part 3 -0RTT, is underway. Can you describe in more detail what ALB means for your use case?

@eriksw
Copy link

eriksw commented Jan 28, 2021

@dougch Separately, I'm curious about ETA for TLS_CHACHA20_POLY1305_SHA256 on the ALB <-> Backend side.

(Not a high priority, just a curiosity, particularly with respect to arm-based EC2 instances.)

@pprindeville
Copy link

We are in August 2020 :) Any light on the TLSv1.3 release ?

And now it's August 2021...

@balthazar
Copy link

Amazon is a small startup with barely enough funding to get more than three engs full-time, be understanding guys.

@exussum12
Copy link

Can you describe in more detail what ALB means for your use case

@dougch for me its being supported here
image

https://docs.aws.amazon.com/elasticloadbalancing/latest/application/create-https-listener.html

Using curl --tlsv1.3 alb.address should work if the security policy has 1.3 enabled

part 3 has now been closed, but I still can't use tls 1.3

@zaherd
Copy link

zaherd commented Aug 25, 2021

Thank you for your comments.
A functional release of TLS1,3 has been added to s2n back in August 2020. We recently added the support of additional functionalities including session resumption and early data. We now have complete implementation of the new version. If you have any specific functionality, please don't hesitate to open an issue for us.

@exussum12
Copy link

Would it be possible to add this as a security policy then ?

@zaherd
Copy link

zaherd commented Aug 25, 2021

Would it be possible to add this as a security policy then ?

I contacted the ALB team and asked them to reach out to you and provide more details about their TLS1.3 plans.

@zaherd zaherd closed this as completed Aug 25, 2021
@pprindeville
Copy link

On AMI Linux 2, if I do a yum update mod_ssl will I get a TLSv1.3 capable package?

@eshwar-natarajan
Copy link

eshwar-natarajan commented Aug 5, 2022

AWS Team, what are the plans for adding support to TLS1.3 on AWS ALB? I have a customer insisting on the same to be security compliant.

AWS NLB supports it for long time and I don't see any roadmap for ALB yet.

@ishworg
Copy link

ishworg commented Oct 11, 2022

NLB listener support for tls1.3 has landed https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-listener.html#describe-ssl-policies late last year or early this year.

thanks 👍🏼

@eshwar-natarajan
Copy link

eshwar-natarajan commented Oct 11, 2022

I am looking for TLS 1.3 on ALB and since it is yet not available, I am using NLB - ALB bridging to achieve TLS 1.3.

Here is the quick view of the architecture. I did not use NLB with ALB as Target group because it only supports TCP 443 as protocol which would mean that TLS termination happens at ALB instead and I still end up with TLS 1.2 policy on ALB.

Wagepoint Architecture - NLB ALB Architecture (1)

@shblue21
Copy link

Now AWS Application Load Balancer Supports TLS 1.3!
Using ELBSecurityPolicy-TLS13-1-2-2021-06 Security policy

image

@rnhurt
Copy link

rnhurt commented Mar 17, 2023

Unfortunately, I'm not seeing that option in my ALB settings (us-east-1). 😞

Also the ALB docs have not been updated and still recommend ELBSecurityPolicy-2016-08. Maybe the updates haven't rolled out to all the accounts/regions/zones yet. 🤷

@soukicz
Copy link

soukicz commented Mar 17, 2023

It is available in eu-west-1 (no documentation yet)

image

@eshwar-natarajan
Copy link

Now AWS Application Load Balancer Supports TLS 1.3! Using ELBSecurityPolicy-TLS13-1-2-2021-06 Security policy

image

Yes, I can confirm that the ELBSecurityPolicy-TLS13-1-2-2021-06 is not available on ca-central-1 region.

@shblue21
Copy link

shblue21 commented Mar 17, 2023

@rnhurt I guess it didn't apply to all regions. I hope to have it rolled out to all regions soon.
My account is in the ap-northeast-2(Seoul) region.

@exussum12
Copy link

exussum12 commented Mar 17, 2023

Its there on the CLI

aws --region=ap-northeast-2 elbv2 describe-ssl-policies | grep -B 8 TLSv1.3

@rnhurt
Copy link

rnhurt commented Mar 17, 2023

Yup, I can see it in the CLI for us-east-1 but not in the console (yet).

["TLSv1","TLSv1.1","TLSv1.2"]
["TLSv1.2","TLSv1.3"]
["TLSv1.2","TLSv1.3"]
["TLSv1.2","TLSv1.3"]
["TLSv1.2","TLSv1.3"]
["TLSv1.1","TLSv1.2","TLSv1.3"]
["TLSv1","TLSv1.1","TLSv1.2","TLSv1.3"]
["TLSv1.3"]
["TLSv1.2"]
["TLSv1.1","TLSv1.2"]
["TLSv1.2"]
["TLSv1","TLSv1.1","TLSv1.2"]
["TLSv1","TLSv1.1","TLSv1.2"]
["TLSv1","TLSv1.1","TLSv1.2"]
["TLSv1.2"]
["TLSv1.1","TLSv1.2"]
["TLSv1.2"]
["TLSv1.2"]

image

@richzw
Copy link

richzw commented Mar 23, 2023

Official Doc Application Load Balancer now supports TLS 1.3 is here

https://aws.amazon.com/about-aws/whats-new/2023/03/application-load-balancer-tls-1-3/

@xtermi2
Copy link

xtermi2 commented Mar 23, 2023

This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests