[openssl-users] Call for testing TLS 1.3
Matt Caswell
matt at openssl.org
Thu May 24 10:40:08 UTC 2018
On 24/05/18 10:58, John Jiang wrote:
> Should I see PSK identity here? Or, it is the TLS session ticket.
It's the session ticket.
> A HelloRetryRequest will occur if the key share provided by the client
> is not acceptable to the server. By default the client will send an
> X25519 key share, so if the server does not accept that group then an
> HRR will result, e.g.
>
> $ openssl s_server -cert cert.pem -key key.pem -groups P-256
> $ openssl s_client
>
> It looks option "-groups" just specifies the most preferable named groups,
> but other groups still could be negotiated. Right?
No, it restricts the groups acceptable to the server.
>
> I found interesting things from trace logs.
>
> BTW, the TLS 1.3 wiki [1] stats that the TLS 1.3 cipher suites are named:
> TLS13-AES-256-GCM-SHA384
> TLS13-CHACHA20-POLY1305-SHA256
> TLS13-AES-128-GCM-SHA256
> TLS13-AES-128-CCM-8-SHA256
> TLS13-AES-128-CCM-SHA256
> But with version 1.1.1-pre6, they are using the formal names,
> like TLS_AES_256_GCM_SHA384.
Ah, right thanks - we renamed them to the standard names a while ago. I
fixed the wiki.
Matt
>
> [1] https://wiki.openssl.org/index.php/TLS1.3
>
> Thanks!
>
>
>
> Matt
>
>
>
> >
> > 2018-04-29 18:43 GMT+08:00 Kurt Roeckx <kurt at roeckx.be <mailto:kurt at roeckx.be>
> > <mailto:kurt at roeckx.be <mailto:kurt at roeckx.be>>>:
> >
> > The upcomming OpenSSL 1.1.1 release will have TLS 1.3 support. TLS
> > 1.3 brings a lot of changes that might cause incompatibility. For
> > an overview see https://wiki.openssl.org/index.php/TLS1.3
> <https://wiki.openssl.org/index.php/TLS1.3>
> > <https://wiki.openssl.org/index.php/TLS1.3
> <https://wiki.openssl.org/index.php/TLS1.3>>
> >
> > We are considering if we should enable TLS 1.3 by default or not,
> > or when it should be enabled. For that, we would like to know how
> > applications behave with the latest beta release.
> >
> > When testing this, it's important that both sides of the
> > connection support the same TLS 1.3 draft version. OpenSSL
> > currently implements draft 26. We would like to see tests
> > for OpenSSL acting as client and server.
> >
> > https://github.com/tlswg/tls13-spec/wiki/Implementations
> <https://github.com/tlswg/tls13-spec/wiki/Implementations>
> > <https://github.com/tlswg/tls13-spec/wiki/Implementations
> <https://github.com/tlswg/tls13-spec/wiki/Implementations>> lists
> > other TLS 1.3 implementations and the draft they currently
> > support. Note that the versions listed there might not be for the
> > latest release. It also lists some https test servers.
> >
> > We would really like to see a diverse set of applictions being
> > tested. Please report any results you have to us.
> >
> >
> > Kurt
> >
> > --
> > openssl-users mailing list
> > To unsubscribe:
> > https://mta.openssl.org/mailman/listinfo/openssl-users
> <https://mta.openssl.org/mailman/listinfo/openssl-users>
> > <https://mta.openssl.org/mailman/listinfo/openssl-users
> <https://mta.openssl.org/mailman/listinfo/openssl-users>>
> >
> >
> >
> >
> --
> openssl-users mailing list
> To unsubscribe:
> https://mta.openssl.org/mailman/listinfo/openssl-users
> <https://mta.openssl.org/mailman/listinfo/openssl-users>
>
>
>
>
More information about the openssl-users
mailing list