On Wed, Aug 8, 2018 at 6:26 AM, Matt Caswell <m...@openssl.org> wrote:
> > > On 08/08/18 14:21, Benjamin Kaduk wrote: > > On Wed, Aug 08, 2018 at 02:05:00PM +0100, Matt Caswell wrote: > >> Draft 28 defines the inappropriate_fallback alert as follows: > >> > >> inappropriate_fallback Sent by a server in response to an invalid > >> connection retry attempt from a client > >> > >> With the introduction of the downgrade protection sentinels it now seems > >> that an inappropriate fallback could also be detected by the client. > >> Should this wording be changed? > > > > Well, *fallback* specifically is inherently client-driven; the things the > > client could detect would be more of an incorrectly negotiated version > > (presumably due to an active attack). > > Consider the scenario where a server supports TLSv1.3/TLSv1.2 but does > not support RFC7507 (TLS Fallback Signalling Cipher Suite Value). > > If the client attempts a TLSv1.3 connection first and fails (e.g. an > active attacker prevented it) and then falls back to TLSv1.2 it would be > able to detect that its fallback attempt was inappropriate when it sees > the downgrade protection sentinels. In that case inappropriate_fallback > seems reasonable. > I don't think that is the alert I would choose in this circumstance. Probably "illegal_parameter" -Ekr > Matt > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls