Re: [TLS] Adoption call for draft-davidben-tls13-pkcs1

Ilari Liusvaara <ilariliusvaara@welho.com> Wed, 11 December 2019 14:22 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D1CD120033 for <tls@ietfa.amsl.com>; Wed, 11 Dec 2019 06:22:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lH5JB_Hzt2ET for <tls@ietfa.amsl.com>; Wed, 11 Dec 2019 06:22:00 -0800 (PST)
Received: from welho-filter3.welho.com (welho-filter3.welho.com [83.102.41.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A8C912000F for <tls@ietf.org>; Wed, 11 Dec 2019 06:22:00 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by welho-filter3.welho.com (Postfix) with ESMTP id ADA4DBF72 for <tls@ietf.org>; Wed, 11 Dec 2019 16:21:57 +0200 (EET)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp1.welho.com ([IPv6:::ffff:83.102.41.84]) by localhost (welho-filter3.welho.com [::ffff:83.102.41.25]) (amavisd-new, port 10024) with ESMTP id RVp0uY9r6xV3 for <tls@ietf.org>; Wed, 11 Dec 2019 16:21:57 +0200 (EET)
Received: from LK-Perkele-VII (87-100-246-37.bb.dnainternet.fi [87.100.246.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by welho-smtp1.welho.com (Postfix) with ESMTPSA id 4E3B2286 for <tls@ietf.org>; Wed, 11 Dec 2019 16:21:56 +0200 (EET)
Date: Wed, 11 Dec 2019 16:21:55 +0200
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: tls@ietf.org
Message-ID: <20191211142155.GA1879660@LK-Perkele-VII>
References: <843cc437-4c6d-43ce-b634-527a287c4e27@www.fastmail.com> <c4bab542-f1fd-4c80-89b8-1b7a3ef883a7@www.fastmail.com> <CAMfhd9W_+1i=Q48GKAxT=TtHm+fKxUKUepqCtfJ7xQ6LgM4h_w@mail.gmail.com> <CAEMoRCshwo1vsb+bYbJLpOCMWGcJ15sz8COXeXbxmX-KDbY8Mw@mail.gmail.com> <20191207102017.GA1754124@LK-Perkele-VII> <8f54acb3-61df-4617-b2c6-53b8c9021575@redhat.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <8f54acb3-61df-4617-b2c6-53b8c9021575@redhat.com>
User-Agent: Mutt/1.12.2 (2019-09-21)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/1U-aOVSwEYmArvQBaYh-k5zZBx8>
Subject: Re: [TLS] Adoption call for draft-davidben-tls13-pkcs1
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2019 14:22:02 -0000

On Wed, Dec 11, 2019 at 02:21:48PM +0100, Hubert Kario wrote:
> On Saturday, 7 December 2019 11:20:17 CET, Ilari Liusvaara wrote:
> > 
> > One test I just tried:
> > 
> > - Smartcard capable of raw RSA.
> > - OpenSC PKCS#11 drivers.
> > - Firefox ESR 68
> > - Server supports TLS 1.3 (Accept RSA PKCS#1v1.5 client signatures is
> >   enabled[2]).
> > 
> > Result: Failed. Client hits internal error code SEC_ERROR_LIBRARY_FAILURE
> > [3].
> 
> That doesn't match my understanding of how NSS works – AFAIK, NSS (and as
> such, Firefox), will try both raw RSA and rsa-pss signatures with the token,
> depending on what kind of algorithms the token advertises.
> 
> I think the issue was the old version of OpenSC, new versions can do rsa-pss
> with rsa-raw:
> https://bugzilla.redhat.com/show_bug.cgi?id=1595626
> https://github.com/OpenSC/OpenSC/pull/1435

Ok, upgrading the OpenSC to git master (0.20.0-rc34-2-gee78b0b8) makes
client certificates in TLS 1.3 in Firefox work with that card (works even
if accept RSA PKCS#1v1.5 client signatures is disabled on server side).

There is apparently no release with the fix. One needs 0.20-rcX or recent
git master.


-Ilari