[gnutls-devel] GnuTLS | GnuTLS sends TLS 1.3 downgrade sentinel in TLS 1.3 (#689)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Fri Feb 1 22:54:52 CET 2019
New Issue was created.
Issue 689: https://gitlab.com/gnutls/gnutls/issues/689
Author: David Benjamin
Assignee:
## Description of problem:
GnuTLS sends the downgrade sentinel at TLS 1.3. Per RFC 8446, it should only be sent at TLS 1.2 or earlier.
https://tools.ietf.org/html/rfc8446#section-4.1.3
Skimming `handshake.c`, the issue appears to be that `_gnutls_gen_server_random` is called very early, before the `supported_versions` extension is parsed.
## Version of gnutls used:
master branch. Also reproduced in 3.6.5.
## Distributor of gnutls (e.g., Ubuntu, Fedora, RHEL)
compiled from source
## How reproducible:
Steps to Reproduce:
* `gnutls-serv -p 4433 -a --x509certfile ./doc/credentials/x509/cert-rsa.pem --x509keyfile ./doc/credentials/x509/key-rsa.pem`
* `openssl s_client -connect localhost:4433 -debug` with OpenSSL 1.1.1 or later
* Look for the first block of "read from " lines, to find the ServerHello
* Check the rest of the output to confirm TLS 1.3 was negotiated
## Actual results:
The ServerHello contains the string "DOWNGRD" in the printable hex dump (it's split over two rows), which is (most of) the TLS 1.3 downgrade sentinel.
## Expected results:
The TLS 1.3 downgrade sentinel is not present.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/issues/689
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190201/77c7219c/attachment.html>
More information about the Gnutls-devel
mailing list