Network Working Group | D. Benjamin |
Internet-Draft | Google LLC |
Intended status: Informational | July 29, 2019 |
Expires: January 30, 2020 |
Applying GREASE to TLS Extensibility
draft-ietf-tls-grease-03
This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 30, 2020.
Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
The TLS protocol [RFC8446] includes several points of extensibility, including the list of cipher suites and several lists of extensions. The values transmitted in these lists identify implementation capabilities. TLS follows a model where one side, usually the client, advertises capabilities and the peer, usually the server, selects them. The responding side must ignore unknown values so that new capabilities may be introduced to the ecosystem while maintaining interoperability.
However, bugs may cause an implementation to reject unknown values. It will interoperate with existing peers, so the mistake may spread through the ecosystem unnoticed. Later, when new values are defined, updated peers will discover that the metaphorical joint in the protocol has rusted shut and that the new values cannot be deployed without interoperability failures.
To avoid this problem, this document reserves some currently unused values for TLS implementations to advertise at random. Correctly implemented peers will ignore these values and interoperate. Peers that do not tolerate unknown values will fail to interoperate, revealing the mistake before it is widespread.
In keeping with the rusted joint metaphor, this technique is named GREASE (Generate Random Extensions And Sustain Extensibility).
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 RFC 2119[RFC2119] RFC 8174 when, and only when, they appear in all capitals, as shown here.
This document reserves a number of TLS protocol values, referred to as GREASE values. These values were allocated sparsely to discourage server implementations from conditioning on them. For convenience, they were also chosen so all types share a number scheme with a consistent pattern while avoiding collisions with any existing applicable registries in TLS.
RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH. The values prefaced with {TBD} are suggested values and subject to change prior to final allocation by IANA.
The following values are reserved as GREASE values for cipher suites and ALPN [RFC7301] identifiers:
The following values are reserved as GREASE values for extensions, named groups, signature algorithms, and versions:
The values allocated above are thus no longer available for use as TLS or DTLS [RFC6347] version numbers.
The following values are reserved as GREASE values for PskKeyExchangeModes.
Most extension points in TLS are offered by the client and selected by the server. This section details client and server behavior around GREASE values for these.
When sending a ClientHello, a client MAY behave as follows:
Clients MUST reject GREASE values when negotiated by the server. In particular, the client MUST fail the connection if a GREASE value appears any in the following:
Note that this requires no special processing on the client. Clients are already required to reject unknown values selected by the server.
When processing a ClientHello, servers MUST NOT treat GREASE values differently from any unknown value. Servers MUST NOT negotiate any GREASE value when offered in a ClientHello. Servers MUST correctly ignore unknown values in a ClientHello and attempt to negotiate with one of the remaining parameters. (There may not be any known parameters remaining, in which case parameter negotiation will fail.)
Note that these requirements are restatements or corollaries of existing server requirements in TLS.
Some extension points are offered by the server and selected by the client. This section details client and server behavior around GREASE values for these.
When sending a CertificateRequest in TLS 1.3, a server MAY behave as follows:
When sending a NewSessionTicket message in TLS 1.3, a server MAY select one or more GREASE extension values and advertise them as extensions with varying length and contents.
Servers MUST reject GREASE values when negotiated by the client. In particular, the server MUST fail the connection if a GREASE value appears any in the following:
Note that this requires no special processing on the server. Servers are already required to reject unknown values selected by the client.
When processing a CertificateRequest or NewSessionTicket, clients MUST NOT treat GREASE values differently from any unknown value. Clients MUST NOT negotiate any GREASE value when offered by the server. Clients MUST correctly ignore unknown values offered by the server and attempt to negotiate with one of the remaining parameters. (There may not be any known parameters remaining, in which case parameter negotiation will fail.)
Note that these requirements are restatements or corollaries of existing client requirements in TLS.
Implementations advertising GREASE values SHOULD select them at random. This is intended to encourage implementations to ignore all unknown values rather than any individual value. Implementations MUST honor protocol specifications when sending GREASE values. For instance, section 4.2 of [RFC8446] forbids duplicate extension types within a single extension block. Implementations sending multiple GREASE extensions in a single block thus must ensure the same value is not selected twice.
Implementations SHOULD balance diversity in GREASE advertisements with determinism. For example, a client which randomly varies GREASE value positions for each connection may only fail against a broken server with some probability. This risks the failure being masked by automatic retries. A client which positions GREASE values deterministically over a period of time (such as a single software release) stresses fewer cases but is more likely to detect bugs from those cases.
This document updates the TLS Cipher Suite Registry, available from <https://www.iana.org/assignments/tls-parameters>:
Value | Description | DTLS-OK | Recommended | Reference |
---|---|---|---|---|
{TBD} {0x0A,0x0A} | Reserved | Y | N | (this document) |
{TBD} {0x1A,0x1A} | Reserved | Y | N | (this document) |
{TBD} {0x2A,0x2A} | Reserved | Y | N | (this document) |
{TBD} {0x3A,0x3A} | Reserved | Y | N | (this document) |
{TBD} {0x4A,0x4A} | Reserved | Y | N | (this document) |
{TBD} {0x5A,0x5A} | Reserved | Y | N | (this document) |
{TBD} {0x6A,0x6A} | Reserved | Y | N | (this document) |
{TBD} {0x7A,0x7A} | Reserved | Y | N | (this document) |
{TBD} {0x8A,0x8A} | Reserved | Y | N | (this document) |
{TBD} {0x9A,0x9A} | Reserved | Y | N | (this document) |
{TBD} {0xAA,0xAA} | Reserved | Y | N | (this document) |
{TBD} {0xBA,0xBA} | Reserved | Y | N | (this document) |
{TBD} {0xCA,0xCA} | Reserved | Y | N | (this document) |
{TBD} {0xDA,0xDA} | Reserved | Y | N | (this document) |
{TBD} {0xEA,0xEA} | Reserved | Y | N | (this document) |
{TBD} {0xFA,0xFA} | Reserved | Y | N | (this document) |
RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH. The cipher suite numbers listed in the first column are numbers used for interoperability testing and it's suggested that IANA use these values for assignment.
This document updates the Supported Groups Registry, available from <https://www.iana.org/assignments/tls-parameters>:
Value | Description | DTLS-OK | Recommended | Reference |
---|---|---|---|---|
{TBD} 2570 | Reserved | Y | N | (this document) |
{TBD} 6682 | Reserved | Y | N | (this document) |
{TBD} 10794 | Reserved | Y | N | (this document) |
{TBD} 14906 | Reserved | Y | N | (this document) |
{TBD} 19018 | Reserved | Y | N | (this document) |
{TBD} 23130 | Reserved | Y | N | (this document) |
{TBD} 27242 | Reserved | Y | N | (this document) |
{TBD} 31354 | Reserved | Y | N | (this document) |
{TBD} 35466 | Reserved | Y | N | (this document) |
{TBD} 39578 | Reserved | Y | N | (this document) |
{TBD} 43690 | Reserved | Y | N | (this document) |
{TBD} 47802 | Reserved | Y | N | (this document) |
{TBD} 51914 | Reserved | Y | N | (this document) |
{TBD} 56026 | Reserved | Y | N | (this document) |
{TBD} 60138 | Reserved | Y | N | (this document) |
{TBD} 64250 | Reserved | Y | N | (this document) |
RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH. The named group numbers listed in the first column are numbers used for interoperability testing and it's suggested that IANA use these values for assignment.
This document updates the ExtensionType Values registry, available from <https://www.iana.org/assignments/tls-extensiontype-values>:
Value | Extension name | TLS 1.3 | Recommended | Reference |
---|---|---|---|---|
{TBD} 2570 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 6682 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 10794 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 14906 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 19018 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 23130 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 27242 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 31354 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 35466 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 39578 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 43690 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 47802 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 51914 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 56026 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 60138 | Reserved | CH, CR, NST | N | (this document) |
{TBD} 64250 | Reserved | CH, CR, NST | N | (this document) |
RFC EDITOR: PLEASE REMOVE THE FOLLOWING PARAGRAPH. The extension numbers listed in the first column are numbers used for interoperability testing and it's suggested that IANA use these values for assignment.
This document updates the TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs registry, available from <https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values>:
Protocol | Identification Sequence | Reference |
---|---|---|
Reserved | {TBD} 0x0A 0x0A | (this document) |
Reserved | {TBD} 0x1A 0x1A | (this document) |
Reserved | {TBD} 0x2A 0x2A | (this document) |
Reserved | {TBD} 0x3A 0x3A | (this document) |
Reserved | {TBD} 0x4A 0x4A | (this document) |
Reserved | {TBD} 0x5A 0x5A | (this document) |
Reserved | {TBD} 0x6A 0x6A | (this document) |
Reserved | {TBD} 0x7A 0x7A | (this document) |
Reserved | {TBD} 0x8A 0x8A | (this document) |
Reserved | {TBD} 0x9A 0x9A | (this document) |
Reserved | {TBD} 0xAA 0xAA | (this document) |
Reserved | {TBD} 0xBA 0xBA | (this document) |
Reserved | {TBD} 0xCA 0xCA | (this document) |
Reserved | {TBD} 0xDA 0xDA | (this document) |
Reserved | {TBD} 0xEA 0xEA | (this document) |
Reserved | {TBD} 0xFA 0xFA | (this document) |
GREASE values may not be negotiated, so they do not directly impact the security of TLS connections.
Historically, when interoperability problems arise in deploying new TLS features, implementations have used a fallback retry on error with the feature disabled. This allows an active attacker to silently disable the new feature. By preventing a class of such interoperability problems, GREASE reduces the need for this kind of fallback.
If an implementation does not select GREASE values at random it is possible it will allow for fingerprinting of the implementation or perhaps even of individual users. This can result in a negative impact to a user's privacy.
The author would like to thank Adam Langley, Nick Harper, and Steven Valdez for their feedback and suggestions. In addition, the rusted joint metaphor is originally due to Adam Langley.
[RFC2119] | Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997. |
[RFC6347] | Rescorla, E. and N. Modadugu, "Datagram Transport Layer Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347, January 2012. |
[RFC7301] | Friedl, S., Popov, A., Langley, A. and E. Stephan, "Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension", RFC 7301, DOI 10.17487/RFC7301, July 2014. |
[RFC8174] | Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017. |
[RFC8446] | Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018. |