Disabling TLS Renegotiation and TLS Secure Renegotiation #21437
-
Hello, I'm implementing Open Finance API's for brazilian ecosystem and the requirements are regulated by a central institution (Central Bank of Brazil). One of the security requiments is: 3.5 The features "TLS Session Resumption" and "TLS Renegotiation" must be disabled We asked the regulator(Central Bank of Brazil) if TLS Secure Renegotiation is included when they said TLS Renegotiation and they answered "yes", so we must also disable TLS Secure Renegotiation on our servers. I've tried to disable TLS Secure Renegotiation chaging openssl.cnf options when checking the configuration against apache and nginx (that relys on openssl), but always without success. Everytime I try a command like below I'll see TLS Secure Renegotiation is still enabled.
I know that's possible to disable both features using appliances, like Citrix ADC, but I would like to see if it's also possible using only openssl configuration. Thanks |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
I think you were given incorrect advice. Disabling "secure renegotiation" and disabling "renegotiation" are not the same thing. You do not want to disable "secure renegotiation". Disabling "renegotiation" is a good idea because renegotiation is an extremely problematic feature. But having "secure renegotiation" show up in "Secure renegotiation" does not mean you support renegotiation. It merely means that you have applied the security fix in RFC 5746. It is important to support that extension even if you have disabled renegotiation, due to details of how the attack works. (The client can't know whether you've disabled renegotiation or not, so it needs to check for it always being present.) Indeed, if you were to disable that, your site may stop working with future clients that check for this security fix. The problem here is just that the output of the command is confusing. To check whether renegotiation itself is disabled, you need the client to actually attempt a renegotiation and see that it failed. One way to do this is to send the "R" comment to
This shows that |
Beta Was this translation helpful? Give feedback.
I think you were given incorrect advice. Disabling "secure renegotiation" and disabling "renegotiation" are not the same thing. You do not want to disable "secure renegotiation".
Disabling "renegotiation" is a good idea because renegotiation is an extremely problematic feature. But having "secure renegotiation" show up in
openssl s_client
is very important and should not be disabled."Secure renegotiation" does not mean you support renegotiation. It merely means that you have applied the security fix in RFC 5746. It is important to support that extension even if you have disabled renegotiation, due to details of how the attack works. (The client can't know whether you've disabled renegoti…