For those interested in the guts, this came up when discussing
https://bugzilla.mozilla.org/show_bug.cgi?id=1330618 where Hubert
noted that NSS is not compliant with this requirement.

On 16 January 2017 at 13:51, RFC Errata System
<rfc-edi...@rfc-editor.org> wrote:
> The following errata report has been submitted for RFC7919,
> "Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport 
> Layer Security (TLS)".
>
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=7919&eid=4908
>
> --------------------------------------
> Type: Technical
> Reported by: Martin Thomson <martin.thom...@gmail.com>
>
> Section: 4
>
> Original Text
> -------------
>    If a compatible TLS server receives a Supported Groups extension from
>    a client that includes any FFDHE group (i.e., any codepoint between
>    256 and 511, inclusive, even if unknown to the server), and if none
>    of the client-proposed FFDHE groups are known and acceptable to the
>    server, then the server MUST NOT select an FFDHE cipher suite.  In
>    this case, the server SHOULD select an acceptable non-FFDHE cipher
>    suite from the client's offered list.  If the extension is present
>    with FFDHE groups, none of the client's offered groups are acceptable
>    by the server, and none of the client's proposed non-FFDHE cipher
>    suites are acceptable to the server, the server MUST end the
>    connection with a fatal TLS alert of type insufficient_security(71).
>
> Corrected Text
> --------------
>    If a compatible TLS server receives a Supported Groups extension from
>    a client that includes any FFDHE group (i.e., any codepoint between
>    256 and 511, inclusive, even if unknown to the server), and if none
>    of the client-proposed FFDHE groups are known and acceptable to the
>    server, then the server MUST NOT select an FFDHE cipher suite.  In
>    this case, the server SHOULD select an acceptable non-FFDHE cipher
>    suite from the client's offered list.
>
> Notes
> -----
> The text is overly prescriptive about the alert code that needs to used if 
> there are no acceptable cipher suites available.  If the server is unable to 
> pick a cipher suite, it can send a handshake_failure(40) alert, which this 
> text would prohibit.  handshake_failure is at least equally valid in practice.
>
> This eliminates the prescriptive text about the alert type.
>
> Servers eliminate cipher suites from considerations in numerous ways.  Being 
> able to definitively identify the reason as a (perceived) shortcoming in the 
> strength of the offered security is actually quite challenging in practice.
>
> It's true that insufficient_security is perhaps a more desirable code to use 
> in this case, but it's not generically possible to determine that the server 
> configuration is "more secure" than the combinations on offer by the client.  
> Consider also the possibility that it's the server that is insecure because 
> it doesn't some of the options offered by the client.  That's a general 
> criticism of the value of insufficient_security, but it should at least 
> motivate why insufficient_security should never be mandated in this way.
>
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party
> can log in to change the status and edit the report, if necessary.
>
> --------------------------------------
> RFC7919 (draft-ietf-tls-negotiated-ff-dhe-10)
> --------------------------------------
> Title               : Negotiated Finite Field Diffie-Hellman Ephemeral 
> Parameters for Transport Layer Security (TLS)
> Publication Date    : August 2016
> Author(s)           : D. Gillmor
> Category            : PROPOSED STANDARD
> Source              : Transport Layer Security
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to