Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update of "Prohibited TLS 1.2 Cipher Suites" #825

Closed
wants to merge 1 commit into from
Closed

Update of "Prohibited TLS 1.2 Cipher Suites" #825

wants to merge 1 commit into from

Conversation

emanjon
Copy link

@emanjon emanjon commented Feb 23, 2021

RFC 7540 is an awesome TLS 1.2 profile, a often recomment it for that purpose.

As far as I know, there has been 4 new ciphersuites (2 for TLS 1.2 and 2 for TLS 1.3) and 1 PskKeyExchangeMode violating the null and ephemeral key exchange requirements mandated by RFC 7540.

RFC 7540 is an awesome TLS 1.2 profile, a often recomment it for that purpose. 

As far as I know, there has been 4 new ciphersuites (2 for TLS 1.2 and 2 for TLS 1.3) and 1 PskKeyExchangeMode violating the null and ephemeral key exchange requirements mandated by RFC 7540.
Copy link
Collaborator

@martinthomson martinthomson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unfortunately, we cannot add to the list of prohibited cipher suites without also defining a new ALPN. A client that is aware of these new requirements and forced to offer these suites with potential use with non-h2 ALPN values cannot assume that a server is also aware of these new requirements. If the server is only compliant with RFC 7540 it won't know that these suites are bad (well, aside from that being obvious). A client can only use INADEQUATE_SECURITY if it knows that the server knows that the choice of cipher suite is wrong.

We knew this to be a limitation of the profile when we built it. That's why it says:

Additional cipher suites with these properties could be defined; these would not be explicitly prohibited.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants