Hi all,

I took the liberty of writing up a patch with what this could look like. I have 
named the option `ciphersuites` and also added the documentation for it as 
well. I have attached the patch to this email. 


> On 14 Sep 2018, at 11:12, Emeric Brun <[email protected]> wrote:
> 
> I think if TLSv <= 1.2 and TLSv1.3 ciphers are handled separately, this is 
> good reason
> to add a new keyword to manage both at a same line on an haproxy 
> configuration file's line .

This is what my patch does indeed. 

> I've just realized that it may be the openssl's response to an issue we faced 
> on earlier version of 
> openssl1.1.1 dev branch where forcing cipher suite on a SSL_CTX broke TLSv1.2 
> handshakes if
> no TLSv1.3 ciphers were specified in this list.
> 
> Doing this, managing differently TLS <= v1.2 and 1.3 ciphers permits the user 
> to not face regression issues
> upgrading  to v1.1.1 when suites where forced in configuration because 
> openssl-1.1.1 kept default
> TVSv1.3 ciphers.

Yeah, without the configurations setting it uses the 1.3 defaults which are 
already good safe defaults. 

> So i'm convinced we need to handle this new TLSv1.3 cipher suite with a new 
> config keyword, but I
> don't know how we should name it. I think it will be a mistake to make appear 
> 1.3 in the new name because
> there is no warranty that next TLS versions will specify specific cipher 
> lists. Openssl's
> API make the choice of "ciphersuites" ... perhaps a the right choice.

That’s what I did :). Hopefully it looks somewhat sensible. 

> Did any of you check how this is endled on "openssl s_client" command line?

From the help for this command:

 -cipher val                Specify TLSv1.2 and below cipher list to be used
 -ciphersuites val          Specify TLSv1.3 ciphersuites to be used

So it does the same thing as my patch does. 

Cheers,

Dirkjan

Attachment: 0001-Add-support-for-ciphersuites-option-for-TLS-1.3.patch
Description: Binary data

Reply via email to