-
Notifications
You must be signed in to change notification settings - Fork 413
Description
sslscan reports on a website running on IIS/Windows Server 2022 with TLS 1.3 enabled:
TLS Fallback SCSV:
Server **does not** support TLS Fallback SCSV
SSL labs test reports it as A+ however (eg: as TLS Fallback SCSV is supported)
I'm writing this issue to inform you that testing TLS_FALLBACK_SCSV on TLS 1.3 is incorrect as TLS 1.3 has deprecated support for TLS_FALLBACK_SCSV. sslscan should account for this and fix the output appropriately.
The version-fallback Signaling Cipher Suite Value specified in [RFC7507] was defined to detect when a given client and server negotiate a lower version of (D)TLS than their highest shared version. TLS 1.3 ([RFC8446]) incorporates a different mechanism that achieves this purpose, via sentinel values in the ServerHello.Random field. With (D)TLS versions prior to 1.2 fully deprecated, the only way for (D)TLS implementations to negotiate a lower version than their highest shared version would be to negotiate (D)TLS 1.2 while supporting (D)TLS 1.3; supporting (D)TLS 1.3 implies support for the ServerHello.Random mechanism. Accordingly, the functionality from [RFC7507] has been superseded, and this document marks it as Obsolete.
Related:
ssllabs/ssllabs-scan#711
ssllabs/ssllabs-scan#786
ssllabs/ssllabs-scan#815
ssllabs/ssllabs-scan#863
ssllabs/ssllabs-scan#910
ssllabs/ssllabs-scan#930
ssllabs/ssllabs-scan#949