Skip to content

TLS Fallback SCSV (Windows Server 2022 IIS) #343

@RvdHout

Description

@RvdHout

sslscan reports on a website running on IIS/Windows Server 2022 with TLS 1.3 enabled:

 TLS Fallback SCSV:
Server **does not** support TLS Fallback SCSV

SSL labs test reports it as A+ however (eg: as TLS Fallback SCSV is supported)

I'm writing this issue to inform you that testing TLS_FALLBACK_SCSV on TLS 1.3 is incorrect as TLS 1.3 has deprecated support for TLS_FALLBACK_SCSV. sslscan should account for this and fix the output appropriately.

The version-fallback Signaling Cipher Suite Value specified in [RFC7507] was defined to detect when a given client and server negotiate a lower version of (D)TLS than their highest shared version. TLS 1.3 ([RFC8446]) incorporates a different mechanism that achieves this purpose, via sentinel values in the ServerHello.Random field. With (D)TLS versions prior to 1.2 fully deprecated, the only way for (D)TLS implementations to negotiate a lower version than their highest shared version would be to negotiate (D)TLS 1.2 while supporting (D)TLS 1.3; supporting (D)TLS 1.3 implies support for the ServerHello.Random mechanism. Accordingly, the functionality from [RFC7507] has been superseded, and this document marks it as Obsolete.

Related:

ssllabs/ssllabs-scan#711
ssllabs/ssllabs-scan#786
ssllabs/ssllabs-scan#815
ssllabs/ssllabs-scan#863
ssllabs/ssllabs-scan#910
ssllabs/ssllabs-scan#930
ssllabs/ssllabs-scan#949

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions