Re: [TLS] SCSV versioning

Bodo Moeller <bmoeller@acm.org> Thu, 26 February 2015 21:06 UTC

Return-Path: <SRS0=DKok=DM=acm.org=bmoeller@srs.kundenserver.de>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 938A41A8843 for <tls@ietfa.amsl.com>; Thu, 26 Feb 2015 13:06:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.638
X-Spam-Level:
X-Spam-Status: No, score=-0.638 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEbQyaQwk42V for <tls@ietfa.amsl.com>; Thu, 26 Feb 2015 13:06:33 -0800 (PST)
Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.130]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB21D1A87B0 for <tls@ietf.org>; Thu, 26 Feb 2015 13:06:32 -0800 (PST)
Received: from mail-ob0-f179.google.com ([209.85.214.179]) by mrelayeu.kundenserver.de (mreue003) with ESMTPSA (Nemesis) id 0MOELI-1YUPYI47L2-005Z7R for <tls@ietf.org>; Thu, 26 Feb 2015 22:06:31 +0100
Received: by mail-ob0-f179.google.com with SMTP id wp4so14197101obc.10 for <tls@ietf.org>; Thu, 26 Feb 2015 13:06:29 -0800 (PST)
MIME-Version: 1.0
X-Received: by 10.202.12.72 with SMTP id 69mr7082702oim.50.1424984789778; Thu, 26 Feb 2015 13:06:29 -0800 (PST)
Received: by 10.76.144.230 with HTTP; Thu, 26 Feb 2015 13:06:29 -0800 (PST)
In-Reply-To: <73A15C72-FC5B-4241-9AA2-9ACCC65B562D@cisco.com>
References: <73A15C72-FC5B-4241-9AA2-9ACCC65B562D@cisco.com>
Date: Thu, 26 Feb 2015 16:06:29 -0500
Message-ID: <CADMpkcLz1cRKz=SPyVXXu_8JBch-dhmCn43dkdxno=d81nos_A@mail.gmail.com>
From: Bodo Moeller <bmoeller@acm.org>
To: 🔓Dan Wing <dwing@cisco.com>
Content-Type: multipart/alternative; boundary="001a113d0d16348af50510042060"
X-Provags-ID: V03:K0:jTnvgMXNpqLY+/qsCjMmWCLooW2OblNPKBiCF6TflHt20isgOfM t0Z9mWtHx6hle5ha0iwdJPd3DVHHxuXcWTdaUnlksggtz8O077ogHfZITdUszL7GIJUfGJ8 kNnX6rijquVJiZ0L83s+g3xZB8eCAYV+KwJyOCtPcyjFJoUN8cb+GBPfsOtxwmmw/sgZcq9 2+frYb0d8p9YDxZjAKCdw==
X-UI-Out-Filterresults: notjunk:1;
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/glvBDBrw5Gm32LmP1-RCE1Yor3I>
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] SCSV versioning
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Feb 2015 21:07:09 -0000

Dan Wing <dwing@cisco.com>:

I recently became aware that Microsoft IE won't implement SCSV.  Near as I
> can tell, this is the main concern [...]:
>

> One of the developers pointed out that the TLS_FALLBACK_SCSV feature has
> a significant downside-- because it doesn't convey any specific version
> information, it becomes a general "never fall back" signal. The problem is
> that such signals are too broad; fallbacks were only ever introduced
> because servers often use TLS stacks with implementation bugs. Any "don't
> fallback" signal sent by such a server will be very bad for compat.
>

I haven't seen this particular complaint before, and also can't quite make
sense of it. TLS_FALLBACK_SCSV is a signal sent by the client, not by the
server as that statement implies (and of course, IE acts as a client). The
specification (draft-ietf-tls-downgrade-scsv-05) says that clients SHOULD
send TLS_FALLBACK_SCSV in fallback handshakes, and that servers MUST react
to it in a specific way. This expressly gives clients some latitude,
allowing trade-offs that may be needed for the sake of compatibility.
(Also, if a client never does a fallback handshake, there's no reason to
send TLS_FALLBACK_SCSV in the first place.)

A related (in a Chinese-whispers way, anyway) complaint that I *have* seen
is the one I've addressed in
http://www.ietf.org/mail-archive/web/tls/current/msg14848.html.  (See also
https://datatracker.ietf.org/doc/draft-ietf-tls-downgrade-scsv/shepherdwriteup/
.)

Bodo