Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to get 100% score without violating TLS 1.3 spec? #928

Open
qwertychouskie opened this issue May 14, 2023 · 5 comments
Open

Unable to get 100% score without violating TLS 1.3 spec? #928

qwertychouskie opened this issue May 14, 2023 · 5 comments

Comments

@qwertychouskie
Copy link

As per https://serverfault.com/a/1033444:

Nginx doesn't support configuring TLS 1.3 cipher suites like this, and you shouldn't, as per RFC 8446, 9.1 there are Mandatory-to-Implement Cipher Suites.

A TLS-compliant application MUST implement the TLS_AES_128_GCM_SHA256 [GCM] cipher suite and SHOULD implement the TLS_AES_256_GCM_SHA384 [GCM] and TLS_CHACHA20_POLY1305_SHA256 [RFC8439] cipher suites (see Appendix B.4).

Either this limitation should be documented somewhere, or an exception should be added for TLS_AES_128_GCM_SHA256 to not lower the score.

@ArchangeGabriel
Copy link

Related : #882, #858, #636, #602

@catharsis71
Copy link

Interesting that NGINX doesn't allow that... Apache absolutely does. In reality, (usually) nothing bad happens if you "break" an RFC, assuming you test thoroughly to ensure you're not losing any compatibility. I've had TLS_AES_128_GCM_SHA256 disabled in Apache on multiple servers for years and it has caused zero problems or compatibility issues.

They're Requests For Comments not actual laws and they aren't necessarily kept up-to-date with current security practices.

Sometimes it's a choice between security and RFC-compliance and the correct answer is usually "it depends"

@ArchangeGabriel
Copy link

The bit on nginx is quite outdated as setting them is definitively possible now using ssl_conf_command Ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256; for instance.

@masterflitzer
Copy link

even if nginx doesnt allow it (which was the case when i looked into it) you can just configure it in your openssl.cnf

@adrelanos
Copy link

nginx configuration for disabling 128 bit ciphers:

ssl_conf_command Ciphersuites TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256;

credits:
https://dustri.org/b/disabling-128-bits-ciphers-on-tls13-on-nginx.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants