-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC 9266: Channel Bindings for TLS 1.3 support #4191
Comments
Dear @cyrusimap team, @aamelnikov, @ksmurchison, @quanah, @hyc, @bgermann, @dilyanpalauzov, @iboukris, @simo5, Can you look for Channel Binding for TLS 1.3 support? There is a recent history with jabber.ru MITM and SCRAM-SHA-*-PLUS is the security solution! Some sources about jabber.ru:
Thanks in advance. Linked to: |
@Neustradamus @ksmurchison I will add a merge request that supports channel binding for TLS 1.3 with tls-exporter.
The first client message (Base64 decoded) is: The patch will ensure to use the correct Export Keying Material (EKM) according to RFC 9266 Section 2.
|
TLS connections of the IMAPD service provide channel binding data for the SASL authentication layer. The current implementation sets the correct "tls-unique" channel binding data for TLS versions 1.2 and lower, however not for TLS version 1.3. TLS version 1.3 requires using specific exporter keying material (EKM) according to RFC 9266 Section 2: Label: "EXPORTER-Channel-Binding" Context: Zero-length string Key Length: 32 bytes Signed-off-by: Guido Kiener <guido@kiener-muenchen.de>
TLS connections of the IMAPD service provide channel binding data for the SASL authentication layer. The current implementation sets the correct "tls-unique" channel binding data for TLS versions 1.2 and lower, however not for TLS version 1.3. TLS version 1.3 requires using specific exporter keying material (EKM) according to RFC 9266 Section 2: Label: "EXPORTER-Channel-Binding" Context: Zero-length string Key Length: 32 bytes Signed-off-by: Guido Kiener <guido@kiener-muenchen.de>
@GuidoKiener: Nice, good job! :) Can you look for "tls-server-end-point" too? |
It's possible to add "tls-server-end-point", however this requires some patches in cyrusimap/cyrus-sasl and cyrusimap/cyrus-imapd. Are there any plans that someone wants to use it? It's only useful for mail clients that cannot create the "tls-exporter" or "tls-unique" channel binding data. I didn't quickly find a mail client that is using the SCRAM-SHA-256-PLUS mechanism at all. |
@GuidoKiener: It must be added in cyrus-sasl and cyrus-imapd to be use in other projects/softwares... Example, it is in SASL2 I-D:
It is in several XEPs too:
|
@GuidoKiener: For example, Psi/Psi+ uses Cyrus SASL via QCA: It is needed for -PLUS variants ^^ More details about SCRAM and -PLUS variants: |
TLS connections of the IMAPD service provide channel binding data for the SASL authentication layer. The current implementation sets the correct "tls-unique" channel binding data for TLS versions 1.2 and lower, however not for TLS version 1.3. TLS version 1.3 requires using specific exporter keying material (EKM) according to RFC 9266 Section 2: Label: "EXPORTER-Channel-Binding" Context: Zero-length string Key Length: 32 bytes Signed-off-by: Guido Kiener <guido@kiener-muenchen.de>
TLS connections of the IMAPD service provide channel binding data for the SASL authentication layer. The current implementation sets the correct "tls-unique" channel binding data for TLS versions 1.2 and lower, however not for TLS version 1.3. TLS version 1.3 requires using specific exporter keying material (EKM) according to RFC 9266 Section 2: Label: "EXPORTER-Channel-Binding" Context: Zero-length string Key Length: 32 bytes Signed-off-by: Guido Kiener <guido@kiener-muenchen.de>
Dear all, Have you looked to have a perfect Channel Bindings support? |
Can you add the support of RFC 9266: Channel Bindings for TLS 1.3?
Channel Bindings for TLS: https://datatracker.ietf.org/doc/html/rfc5929
Little details, to know easily:
I think that you have seen the jabber.ru MITM and Channel Binding is the solution:
Thanks in advance.
Linked to:
The text was updated successfully, but these errors were encountered: