Network Layer Protections restrict use of more recent TLS 1.2 ciphers

Issue #549 resolved
Filip Skokan created an issue

In https://openid.net/specs/fapi-2_0-baseline-01.html#name-network-layer-protections and https://openid.net/specs/openid-financial-api-part-2-1_0.html#tls-considerations we’re restricting the use of TLS 1.2 ciphers to only 4 ciphers.

There were however ciphers added to TLS 1.2 after the BCP, e.g. https://www.rfc-editor.org/rfc/rfc7905, which I believe make no sense to restrict use of.

This affects both FAPI1 and FAPI2

Comments (18)

  1. Tom Jones

    I believe it is inappropriate for OpenID documents to list allowed or proscribed cypher suites due to the fact that OpenID documents cannot be revised, but only replaced. Essentially all cypher suites that are standardized today are to be replaced soon, which means that essentially all OpenID standards will be out-of-date.

  2. Filip Skokan reporter
    • changed status to open

    Yes Nat, the exact four ciphers are now listed. But that doesn't solve the questions at hand.

    Additional TLS 1.2 suites were added after the BCP, these are now making its way to current network stacks, e.g. ChaCha20 AEAD ciphers from https://tools.ietf.org/html/rfc7905 and we are not permitting these, is there a reason to?

  3. Dave Tonge

    Maybe we should ask TLS working group

    It would also be good to get feedback from industry on this

  4. Dave Tonge

    We had another discussion on this and talked about rather pushing people to TLS 1.3. However at the moment the conformance test suite only supports 1.2

    @Joseph Heenan there was a question about if there is a roadmap item to add support to TLS1.3

  5. Joseph Heenan

    There are two separate sides to this - for outgoing connections from the suite everything is fine, TLS 1.3 should work as far as I know. So for testing banks, we’re mostly okay as that’s all outgoing connections from the suite [with the exception of CIBA Ping notifications].

    Incoming connections (which mainly affect the RP tests) are more of an issue as we rely on path based negotiation of TLS certificates and it seems like this perhaps just isn’t possible in TLS 1.3, meaning we need to rework our ingress so that two different external hostnames with different TLS setups are routed to the same instance of the java suite, which requires docker/kubernetes magic that I don’t currently have a good handle on.

    I opened https://gitlab.com/openid/conformance-suite/-/issues/1192 to track this.

  6. Joseph Heenan

    (For clarity, looking into TLS 1.3 support is not currently something we have actively planned as we currently have more urgent things to tackle. If there’s reasons it’s more important that we thing, please let us know.)

  7. Joseph Heenan

    (as per above, the TLS working groups recommendations on ciphers have not changed in the new BCP)

  8. Log in to comment