Hi all,

I am part of a laboratory that is required to test product conformance to 
protocol implementations as part of Common Criteria certification for said 
products. Recently we observed that a product using rsyslog to transmit data 
over TLS 1.3 is not behaving in a way that is consistent with RFC 8446. The RFC 
expects that if the TLS client has an active TLS 1.3 session and receives a TLS 
1.2 Hello Request from the server that attempts to renegotiate the connection, 
the TLS client must terminate the connection. This is a change from TLS 1.2, 
which previously allowed the request to be discarded and ignored.

The current behavior of rsyslog appears to be to receive the TLS 1.2 Hello 
Request but not parse it as if it were TLS traffic. Instead, it simply receives 
it as if it were a raw TCP packet, responds with a TCP ACK, and allows the 
connection to continue unmodified. Based on our understanding, this violates 
RFC 8446. Using the underlying TLS protocol implementation (e.g. openssl, 
gnutls) allows us to see that they behave correctly on their own (e.g., if 
s_client is used to establish a connection to an arbitrary TLS server). This 
suggests the issue is specifically with respect to rsyslog itself. We note that 
syslog-ng exhibits the same behavior, which suggests that this is deliberate.

My question is whether this is already a known issue in rsyslog, if it is the 
result of a deliberate decision, what the rationale for that decision was (Less 
processing overhead? Avoidance of denial of service attacks?), and whether this 
decision exposes rsyslog to any specific attacks or vulnerabilities. While we 
know that TLS 1.3 forbids renegotiation, we aren't sure why the RFC authors 
require an explicit rejection versus simply allowing the packets to be ignored, 
as rsyslog currently does.

Any insights that could be provided here would be greatly appreciated.

Regards,

Justin Fisher | Leidos
CCTL Laboratory Director
Accredited Testing and Evaluation (AT&E) Lab

[email protected]<mailto:[email protected]> | 
https://www.leidos.com/<https://www.leidos.com/CC-FIPS140>
+1 (443) 367-7407 O | +1 (202) 997-6733 M | +1 (610) 468-2102 M

_______________________________________________
rsyslog mailing list
https://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to