Hi Hanumesh,

No problem!

Unfortunately Wireshark doesn't use the right labels for TLS packets,
because there's no one right answer. A Client Hello typically supports
multiple versions of TLS at the same time and depending on what the server
supports, could be used as a TLS1.2 CH or a TLS1.3 CH. So in this case
Wireshark is guessing and guessing wrong. If you open the details for that
packet and unfold the Client Hello, you should be able to find a Supported
Versions extension which contains both TLS1.2 and TLS1.3.

Best,
Dennis


On Thu, 16 Feb 2023 at 15:05, hanumesh nk <hanumeshn...@gmail.com> wrote:

> Hi Dennis,
> Thanks for the fix and workarounds.
>
> I have a question out of curiosity about the first workaround suggested.
> In the tcpdump(attached in this mail) and also in the "client hello"
> attached with the bug, I could see TLS 1.2 is mentioned as the protocol
> being used for the communication.
> So, my question is, if communication is already happening with TLS 1.2,
> then how would negotiating to TLS 1.2 solve the problem?
> Or the server is still in the process of choosing the TLS version (since
> the server knows about the versions supported by the client in the "client
> hello" message) ?
>
> Please, put some light on it and help me understand.
> Best Regards,
> Hanumesh
>
> On Wed, Feb 15, 2023 at 7:54 PM Dennis Jackson <djack...@mozilla.com>
> wrote:
>
>> Hi Hanumesh,
>>
>> I've submitted a patch <https://phabricator.services.mozilla.com/D169918>
>> to fix this for you which we'll get into the next ESR. In the meantime,
>> there are two workarounds which may work for you:
>>
>>    - Disable TLS1.3 on the server so that connections negotiate TLS1.2;
>>    or
>>    - Disable certificate_authorities on the clients.
>>
>> Best,
>> Dennis
>>
>> On Wed, 15 Feb 2023 at 12:59, hanumesh nk <hanumeshn...@gmail.com> wrote:
>>
>>> Hi Martin,
>>> Thanks for your reply.
>>> I had raised a bug (https://bugzilla.mozilla.org/show_bug.cgi?id=1815167 )
>>> as you suggested.
>>>
>>> I want this bug to be fixed as soon as possible. The clients are not
>>> able to connect to the NSS server and are terminated with "unsupported
>>> extension". This is a high priority issue for us.
>>>
>>> Could you please guide me to make it a high priority issue and get it
>>> fixed in the next ESR release ?
>>>
>>> Best Regards,
>>> Hanumesh
>>>
>>> On Thu, Feb 2, 2023 at 6:58 AM Martin Thomson <m...@mozilla.com> wrote:
>>>
>>>> It's possible that we have a bug on our end here.
>>>>
>>>> There are two extensions we don't fully support here:
>>>> * encrypt_then_mac - we have absolutely no knowledge of this, so we
>>>> should be ignoring it.
>>>> * certificate_authorities - the tricky one
>>>>
>>>> We do understand certificate_authorities, but we don't handle it from
>>>> the client.  Now, we can (and probably should) ignore it.  TLS 1.3 allows
>>>> the client to use it, even if it is a rare thing to see in practice.
>>>>
>>>> Can I suggest that you open a bug for this:
>>>> https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS&component=Libraries
>>>> (If you are able, including a full copy of the problematic ClientHello will
>>>> make this a lot easier for us to diagnose.)
>>>>
>>>>
>>>> On Thu, Feb 2, 2023 at 4:14 AM hanumesh nk <hanumeshn...@gmail.com>
>>>> wrote:
>>>>
>>>>> Hi Team,
>>>>> Iam using nss-3.68.4-with-nspr-4.32 in my server. Client is trying to
>>>>> connect to the server using STARTTLS, but after "Client Hello" message is
>>>>> sent, the server sending "Unsupported Extension" to the client and the
>>>>> connection getting closed.
>>>>>
>>>>> Could anyone help me to figure out which extension did the server not
>>>>> supported?
>>>>>
>>>>> Below is the client hello message with extensions obtained from tcpdump
>>>>> :
>>>>> Transport Layer Security
>>>>> TLSv1.2 Record Layer: Handshake Protocol: Client Hello
>>>>> Content Type: Handshake (22)
>>>>> Version: TLS 1.0 (0x0301)
>>>>> Length: 751
>>>>> Handshake Protocol: Client Hello
>>>>> Handshake Type: Client Hello (1)
>>>>> Length: 747
>>>>> Version: TLS 1.2 (0x0303)
>>>>> Random: <Random>
>>>>> Session ID Length: 32
>>>>> Session ID: <Session id>
>>>>> Cipher Suites Length: 62
>>>>> Cipher Suites (31 suites)
>>>>> Compression Methods Length: 1
>>>>> Compression Methods (1 method)
>>>>> Extensions Length: 612
>>>>> Extension: ec_point_formats (len=4)
>>>>> Extension: supported_groups (len=12)
>>>>> Extension: encrypt_then_mac (len=0)
>>>>> Extension: extended_master_secret (len=0)
>>>>> Extension: signature_algorithms (len=48)
>>>>> Extension: supported_versions (len=9)
>>>>> Extension: psk_key_exchange_modes (len=2)
>>>>> Extension: key_share (len=38)
>>>>> Extension: certificate_authorities (len=463)
>>>>>
>>>>> Any help to resolve this problem will be really helpful.
>>>>>
>>>>>
>>>>> Best Regards,
>>>>> Hanumesh
>>>>>
>>>>> --
>>>>> You received this message because you are subscribed to the Google
>>>>> Groups "dev-tech-crypto@mozilla.org" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>>> an email to dev-tech-crypto+unsubscr...@mozilla.org.
>>>>> To view this discussion on the web visit
>>>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAMiJu-nkJqwp3fwY9JXPYZSLeu%3DuLU15WYbNxK3OG5ZjTxps9A%40mail.gmail.com
>>>>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAMiJu-nkJqwp3fwY9JXPYZSLeu%3DuLU15WYbNxK3OG5ZjTxps9A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "dev-tech-crypto@mozilla.org" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to dev-tech-crypto+unsubscr...@mozilla.org.
>>> To view this discussion on the web visit
>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAMiJu-kF1TVDbY8wXeAW6cUubcFtaYppRCdck2-nRMArrK4Rgw%40mail.gmail.com
>>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAMiJu-kF1TVDbY8wXeAW6cUubcFtaYppRCdck2-nRMArrK4Rgw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-tech-crypto@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-tech-crypto+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAON8YFOnCHEBE2HE6yOHNt%3DuQZ0NyaFb%2BcnCcUCeH%3Di%2Bshj3Ww%40mail.gmail.com.

Reply via email to