Bug 1423401
Summary: | TLS 1.3 handshake fails with SSL_REQUIRE_SAFE_NEGOTIATION on | |||
---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Christian Heimes <cheimes> | |
Component: | nss | Assignee: | nss-nspr-maint <nss-nspr-maint> | |
Status: | CLOSED UPSTREAM | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 25 | CC: | cheimes, dueno, emaldona, hkario, kdudka, kengert, rcritten, sardella | |
Target Milestone: | --- | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | If docs needed, set a value | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1455288 (view as bug list) | Environment: | ||
Last Closed: | 2017-10-18 12:52:46 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1455288, 1457787 |
Description
Christian Heimes
2017-02-17 09:13:55 UTC
If mod_nss independently configures allowed cipher suites, have you changed it to allow the new TLS 1.3 ciphersuites? Could you run "ssltap -s" on your system, connect firefox through ssltap to your server, and attach the output from ssltap? (In reply to Kai Engert (:kaie) from comment #1) > If mod_nss independently configures allowed cipher suites, have you changed > it to allow the new TLS 1.3 ciphersuites? Yes, see https://pagure.io/mod_nss/pull-request/35 Yes, see step 2 of reproducer. With "NSSRequireSafeNegotiation off", I'm able to successfully connect to mod_nss over TLS1.3. With "NSSRequireSafeNegotiation on" I get SSL_ERROR_NO_CYPHER_OVERLAP. memo to me: provide ssltap data for Kai. > Wireshark shows a TLS 1.0 handshake (0x301) with renegotiation_info extension (0xff01) and a couple of unknown extensions (40 key share, 43 supported version, 45 psk kx).
I'm assuming you're talking about version in record layer, not the version in the Client Hello message?
Kai, I can't reproduce it using selfserv, the necessary option is missing from selfserv: https://bugzilla.mozilla.org/show_bug.cgi?id=1342019 I've also reproduced using Kai's copr build from https://copr.fedorainfracloud.org/coprs/kengert/nss-with-tls-1.3/ and Christian's mod_nss build from https://copr.fedorainfracloud.org/coprs/cheimes/nss/ My understanding is that renegotiation is forbidden with TLS 1.3 https://tlswg.github.io/tls13-spec/draft-ietf-tls-tls13.txt I don't know if the enabling of TLS 1.3 support on a server requires that the server side disables any support for renegotiation, or if the NSS server code should implement a compatibility behavior. I've reported this upstream at: https://bugzilla.mozilla.org/show_bug.cgi?id=1375837 (In the future, I'd like to encourage you to report such bugs directly to the upstream, because that's where the people are that actually implement the TLS 1.3 code. You didn't get anything by reporting this as a Fedora package bug, besides a 4 month delay until I was able to be the middleman here and forward.) Thanks for proxying my request. Next time I'll directly open a request in upstream. According to the upstream tracker, the issue has been fixed in NSS 3.33. I don't have time to verify the fix with mod_nss. IMO it's ok to close this bug. After all TLS 1.3 is still in draft mode and mod_nss doesn't support TLS 1.3 yet. |