enable TLS 1.3 by default in NSS
Categories
(NSS :: Libraries, task, P2)
Tracking
(Not tracked)
People
(Reporter: kdudka, Unassigned)
References
Details
Attachments
(2 files)
User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Steps to reproduce:
I tried to connect with curl to a TLS server that accepts TLS 1.3 connections only.
Actual results:
The connection failed because TLS 1.3 was not enabled by default in NSS.
Expected results:
TLS 1.3 should be enabled by default in NSS. Firefox now enables TLS 1.3 by default and we have a pull request for curl to also enable it explicitly:
Updated•5 years ago
|
Comment 1•5 years ago
|
||
Seems like it's time, to me. I'll point the community to this bug for discussion.
Reporter | ||
Comment 2•5 years ago
|
||
Sounds good. Thanks for the quick update on this!
Comment 3•5 years ago
|
||
Note: It seems to me that we should not do this in 3.45, but maybe 3.46, so setting that target outright.
Updated•5 years ago
|
Updated•5 years ago
|
A summary of the curl PR:
SSL_VersionRangeGetDefault returns the intersection of the system policy (0x1 to 0xffff by default -- basically unconstrained) with TLS 1.0 to 1.2:
static SSLVersionRange versions_defaults_stream = {
SSL_LIBRARY_VERSION_TLS_1_0,
SSL_LIBRARY_VERSION_TLS_1_2
};
curl uses the SSL_VersionRangeGetDefault function to determine the default TLS versions that should be enabled. In Firefox, this is not used for that purpose. This potentially has to be changed when NSS changes the max to TLS 1.3:
https://searchfox.org/mozilla-central/rev/7a5022a3/security/manager/ssl/nsNSSCallbacks.cpp#1280
Updated•5 years ago
|
Comment 6•5 years ago
|
||
As planned for 3.47, but now for 3.48.
Comment 7•5 years ago
|
||
Comment 8•5 years ago
|
||
These unit tests were broken by the change to TLS version defaults.
In retrospect, this shouldn't have been surprising, but now that it I'm seeing bustage, I'm somewhat surprised that there are so few failures.
Updated•5 years ago
|
Description
•