Go to file
Benjamin Kaduk 6ffeb269a3 Disallow DSA/SHA1/etc. for pure TLS 1.3 ClientHellos
In draft-ietf-tls-tls13-20 Appendix B we find that:

   This section describes protocol types and constants.  Values listed
   as _RESERVED were used in previous versions of TLS and are listed
   here for completeness.  TLS 1.3 implementations MUST NOT send them
   but might receive them from older TLS implementations.

Similarly, in section 4.2.3 we see:

   Legacy algorithms  Indicates algorithms which are being deprecated
      because they use algorithms with known weaknesses, specifically
      SHA-1 which is used in this context with either with RSA using
      RSASSA-PKCS1-v1_5 or ECDSA.  These values refer solely to
      signatures which appear in certificates (see Section 4.4.2.2) and
      are not defined for use in signed TLS handshake messages.
      Endpoints SHOULD NOT negotiate these algorithms but are permitted
      to do so solely for backward compatibility.  Clients offering
      these values MUST list them as the lowest priority (listed after
      all other algorithms in SignatureSchemeList).  TLS 1.3 servers
      MUST NOT offer a SHA-1 signed certificate unless no valid
      certificate chain can be produced without it (see
      Section 4.4.2.2).

However, we are currently sending the SHA2-based DSA signature schemes
and many SHA1-based schemes, which is in contradiction with the specification.

Because TLS 1.3 support will appear in OpenSSL 1.1, we are bound by
stability requirements to continue to offer the DSA signature schemes
and the deprecated hash algorithms.  at least until OpenSSL 1.2.
However, for pure TLS 1.3 clients that do not offer lower TLS versions,
we can be compliant.  Do so, and leave a note to revisit the issue when
we are permitted to break with sacred historical tradition.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3326)
2017-06-24 19:25:43 -05:00
.github
apps PSK related tweaks based on review feedback 2017-06-21 14:45:36 +01:00
boringssl@2070f8ad91
Configurations Configure: give config targets the possibility to enable or disable features 2017-06-22 01:24:54 +02:00
crypto sha/asm/keccak1600-mmx.pl: optimize for Atom and add comparison data. 2017-06-24 09:42:14 +02:00
demos Fix a bundle of trailing spaces in several files 2017-06-09 12:04:10 -04:00
doc Remove duplicate see also reference to BIO_s_mem. 2017-06-22 08:13:11 +10:00
engines Put message strings in state files 2017-06-12 15:03:40 -04:00
external/perl
fuzz
include Add OCSP_resp_get1_id() accessor 2017-06-21 15:01:54 -04:00
krb5@b9ad6c4950
ms Remove filename argument to x86 asm_init. 2017-05-11 17:00:23 -04:00
os-dep
pyca-cryptography@139b25f2ba Update the pyca-cryptography version 2017-05-26 18:00:33 +01:00
ssl Disallow DSA/SHA1/etc. for pure TLS 1.3 ClientHellos 2017-06-24 19:25:43 -05:00
test Fix a memory leak in the new TAP filter BIO 2017-06-23 20:30:27 +01:00
tools
util Add OCSP_resp_get1_id() accessor 2017-06-21 15:01:54 -04:00
VMS
.gitattributes
.gitignore Add apps/progs.h to gitignore 2017-06-15 16:56:56 -04:00
.gitmodules
.travis-apt-pin.preferences Fix travis clang-3.9 builds 2017-06-23 17:57:02 +01:00
.travis-create-release.sh
.travis.yml Fix travis clang-3.9 builds 2017-06-23 17:57:02 +01:00
ACKNOWLEDGEMENTS
appveyor.yml Remove notification settings from appveyor.yml 2017-05-17 12:36:28 +02:00
AUTHORS
build.info
CHANGES Remove bsd_cryptodev engine 2017-06-19 09:31:45 -04:00
config
config.com
Configure Configure: give config targets the possibility to enable or disable features 2017-06-22 01:24:54 +02:00
CONTRIBUTING
e_os.h Add parentheses around macro argument of OSSL_NELEM. 2017-06-20 13:49:43 -04:00
FAQ
INSTALL drop some no-longer-relevant TODO(TLS1.3) entries 2017-06-12 09:19:05 +01:00
LICENSE
Makefile.shared
NEWS Updates CHANGES and NEWS for new release 2017-05-25 12:41:35 +01:00
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VMS
NOTES.WIN
README
README.ECC
README.ENGINE Remove bsd_cryptodev engine 2017-06-19 09:31:45 -04:00
README.FIPS

 OpenSSL 1.1.1-dev

 Copyright (c) 1998-2016 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 OpenSSL license plus the SSLeay license), which means that you are free to
 get and use it for commercial and non-commercial purposes as long as you
 fulfill the conditions of both licenses.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the latest version from the repository
      to see if the problem has already been addressed
    - Configure with no-asm
    - Remove compiler optimisation flags

 If you wish to report a bug then please include the following information
 and create an issue on GitHub:

    - OpenSSL version: output of 'openssl version -a'
    - Any "Configure" options that you selected during compilation of the
      library if applicable (see INSTALL)
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations restrict the use or export of cryptography. If you
 are potentially subject to such restrictions you should seek competent
 professional legal advice before attempting to develop or distribute
 cryptographic code.