On Tue, Nov 10, 2020 at 10:41 PM Yaron Sheffer <yaronf.i...@gmail.com> wrote:
>
> Hi,
>
> We are now revising RFC 7525 for the new world, and in general we are 
> following this draft. So, MUST NOT negotiate TLS 1.0 and 1.1. This brought up 
> the question of SCSV, which was new when RFC 7525 was published but has since 
> been widely implemented/deployed.
>
> I think marking the “oldversions” draft as “obsoletes RFC 7507 (SCSV)” is not 
> great from an ecosystem point of view. People will interpret it as “no need 
> to implement SCSV in new code, no need to expose it as a configuration option 
> in existing code”. And we know that some admins will continue to allow 
> downgrade to TLS 1.0/1.1 no matter what we tell them. IMO we should protect 
> these people from downgrade attacks, even if we disagree with their policy.
>
> So I would call for a more nuanced wording re: SCSV, something like 
> (paraphrasing EKR):
>

Not everybody was happy to implement SCSV:
e.g LibreSSL.

From: https://v4.freshbsd.org/commit/openbsd/src/9t8bOP5HFWMq1Big
"

  Reluctantly add server-side support for TLS_FALLBACK_SCSV.

   This allows for clients that willingly choose to perform a downgrade and
   attempt to establish a second connection at a lower protocol after the
   previous attempt unexpectedly failed, to be notified and have the second
   connection aborted, if the server does in fact support a higher protocol.

   TLS has perfectly good version negotiation and client-side fallback is
   dangerous. Despite this, in order to maintain maximum compatability with
   broken web servers, most mainstream browsers implement this. Furthermore,
   TLS_FALLBACK_SCSV only works if both the client and server support it and
   there is effectively no way to tell if this is the case, unless you control
   both ends.

   Unfortunately, various auditors and vulnerability scanners (including
   certain online assessment websites) consider the presence of a not yet
   standardised feature to be important for security, even if the clients do
   not perform client-side downgrade or the server only supports current TLS
   protocols.

"

> In the world where the only valid values of TLS are 1.2 and 1.3+, the TLS 1.3 
> fallback mechanism should render the SCSV unnecessary. However for existing 
> client and server implementations that still include support for earlier TLS 
> versions, SCSV should continue to be supported.
>
> Thanks,
>         Yaron
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to