Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

openssl server side option "SSL_OP_PRIORITIZE_CHACHA" is not detected / handled correctly #456

Closed
bratkartoffel opened this issue Sep 9, 2020 · 1 comment

Comments

@bratkartoffel
Copy link

Describe the bug
On servers with openssl option "SSL_OP_PRIORITIZE_CHACHA" enabled results in "The server has no preferred cipher suite."

To Reproduce
Steps to reproduce the behavior:

  • Start a TLSv1.2 or TLSv1.3 server with this option enabled (you may also use current proftpd (1.3.7a-r0) on alpine edge)
  • With cipher string EECDH+AES128:EECDH+AES256:CHACHA20:!aPSK:!PSK:!DHE the no preferred-ciphersuite message is shown
  • With cipher string EECDH+AES128:EECDH+AES256:!aPSK:!PSK:!DHE the no preferred-ciphersuite message is not shown

Expected behavior
Sslyze should also honor this setting and not "warn" about server not having a suite order preference. This setting could be determined by sslyze when execution two handshakes, one with ChaCha20 and one without.
If the server prefers ChaCha20, then this option is set and a corresponding mesasge should be shown.

Python environment (please complete the following information):

  • OS: Windows 10
  • Python version: used the distributed .exe 3.0.8

Additional context
Relates to proftpd/proftpd#1076

@nabla-c0d3 nabla-c0d3 added this to To do in 5.0.0 Jan 19, 2021
@nabla-c0d3
Copy link
Owner

Thanks for the detailed report. I've removed the "preferred cipher suite" functionality for now (in efbd476); it had too many problems.

I will fix this bug by building a full-fledged cipher suite order detection check, which has been a common request for the past few years. The main ticket for this is #338. I will close the ticket here as a "duplicate", and I will take this SSL_OP_PRIORITIZE_CHACHA option into account when building the new check.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants