Skip to content

[Feature request] flag absence of extended master secret extension #2806

Open
@ghen2

Description

@ghen2

Which version are you referring to

3.2

Describe your feature request (if it's a technical feature)

The extended_master_secret TLS extension has been introduced in RFC 7627 in response to the triple handshake attack.

This extension has long been optional, but recently, it has been marked a MUST for TLS 1.2 in RFC 9325 (TLS best practices from 2022), and has been made a requirement for FIPS compliance as of May 2023. Some implementations, notably Haskell TLS as of version 2.0, also require the presence of this extension for successful TLS negotation.

So clearly, the lack of this extension will be causing interoperability problems between old servers (eg. openssl < 1.1) and strict clients, and vice versa, as already suggested here for MTA-STS.

Describe the solution you'd like

testssl.sh detects the presence of this extension (in the Server Hello category), but currently without any consequence. It would be useful to flag its absence as severity low or medium problem (there, or under the Vulnerabilities category).

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions