Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto: Enable TLS 1.3 #761

Merged
merged 1 commit into from
Apr 29, 2024
Merged

crypto: Enable TLS 1.3 #761

merged 1 commit into from
Apr 29, 2024

Conversation

ansasaki
Copy link
Contributor

@ansasaki ansasaki commented Mar 15, 2024

The agent server used the SslAcceptor::mozilla_intermediate() which disables TLS 1.3 and restricts the TLS 1.2 ciphers to:

TLSv1.2:
 ciphers:
   TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)
   TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048)
   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519)
   TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048)
   TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096)
   TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096)
   TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096)

With this change TLS 1.3 is enabled. The following ciphers are accepted:

TLSv1.2:
 ciphers:
   TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048)
   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1)
   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1)
   TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1)
TLSv1.3:
 ciphers:
   TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)
   TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)
   TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)

@ansasaki ansasaki force-pushed the enable_tls13 branch 2 times, most recently from 00355a1 to e8505eb Compare April 26, 2024 13:40
Copy link

codecov bot commented Apr 26, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 61.99%. Comparing base (2f7b3ad) to head (e8505eb).
Report is 8 commits behind head on master.

Additional details and impacted files
Flag Coverage Δ
e2e-testsuite 61.99% <100.00%> (+4.40%) ⬆️
upstream-unit-tests 61.99% <100.00%> (+10.98%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Files Coverage Δ
keylime/src/crypto.rs 66.30% <100.00%> (+1.56%) ⬆️

... and 15 files with indirect coverage changes

The agent server used the SslAcceptor::mozilla_intermediate() which
disables TLS 1.3 and restricts the TLS 1.2 ciphers to:

TLSv1.2:
 ciphers:
   TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519)
   TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048)
   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519)
   TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519)
   TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048)
   TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096)
   TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096)
   TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096)
   TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096)

With this change TLS 1.3 is enabled. The following ciphers are accepted:

TLSv1.2:
 ciphers:
   TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048)
   TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048)
   TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1)
   TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1)
   TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1)
TLSv1.3:
 ciphers:
   TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519)
   TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519)
   TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519)

Signed-off-by: Anderson Toshiyuki Sasaki <[email protected]>
@ansasaki ansasaki merged commit f87fbe9 into keylime:master Apr 29, 2024
5 checks passed
@ansasaki ansasaki deleted the enable_tls13 branch April 29, 2024 09:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants