Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qualys SSL Labs scan is incorrectly capping TLS 1.3 servers to an "A" rating due to testing an obsolete functionality. #949

Open
avparuch opened this issue Nov 18, 2023 · 2 comments

Comments

@avparuch
Copy link

avparuch commented Nov 18, 2023

Until recently, our TLS server supported only TLS 1.2 and had an A+ rating on Qualys SSL Labs scans. After enabling TLS 1.3, in addition to TLS 1.2, the rating for the TLS server has been downgraded from A+ to A.

The reason for that is as shown below:

Previously, when only TLS 1.2 was enabled, the Qualys SSL Labs scan used to give the TLS server an A+ rating and add the following under the "Protocol details" section:

image

Now, when both TLS 1.2 and TLS 1.3 are enabled, the Qualys SSL Labs scan gives the TLS server an A rating and adds the following under the "Protocol details" section:
image

More info: https://datatracker.ietf.org/doc/rfc7507/

Now, ironically, after enabling TLS 1.3 in addition to TLS 1.2, the server is capped to an A grade, instead of the previous rating of A+, despite enabling a stronger TLS protocol. Apparently, this is due to a perceived lack of downgrade prevention on the server for TLS1.3

I'm writing this issue to inform you that testing TLS_FALLBACK_SCSV on TLS 1.3 is incorrect as TLS 1.3 has deprecated support for TLS_FALLBACK_SCSV. The Qualys SSLLabs scan should account for this and fix the rating appropriately. Please see rationale below:

Section 1.1 of RFC 8996 says:

The version-fallback Signaling Cipher Suite Value specified in [RFC7507] was defined to detect when a given client and server negotiate a lower version of (D)TLS than their highest shared version. TLS 1.3 ([RFC8446]) incorporates a different mechanism that achieves this purpose, via sentinel values in the ServerHello.Random field. With (D)TLS versions prior to 1.2 fully deprecated, the only way for (D)TLS implementations to negotiate a lower version than their highest shared version would be to negotiate (D)TLS 1.2 while supporting (D)TLS 1.3; supporting (D)TLS 1.3 implies support for the ServerHello.Random mechanism. Accordingly, the functionality from [RFC7507] has been superseded, and this document marks it as Obsolete.

@avparuch avparuch changed the title Qualys SSL Labs scan is incorrectly capping TLS 1.3 servers to an A rating due to testing an obsolete functionality. Qualys SSL Labs scan is incorrectly capping TLS 1.3 servers to an "A" rating due to testing an obsolete functionality. Nov 18, 2023
@avparuch
Copy link
Author

@naumanshah03, please take a look when feasible.

@ArchangeGabriel
Copy link

Related: #930, #910, #863, #853, #815, #786, #711.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants