RFC 8701: Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility
- D. Benjamin
Abstract
This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.¶
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are candidates for any level of Internet Standard; see Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
The TLS protocol [RFC8446] includes several points of
extensibility, including the list of cipher suites and several lists of extensions.
The values transmitted in these lists identify implementation capabilities. TLS follows
a model where one side, usually the client, advertises capabilities, and the
peer, usually the server, selects them. The responding side must ignore unknown
values so that new capabilities may be introduced to the ecosystem while
maintaining interoperabilit
However, bugs may cause an implementation to reject unknown
values. It will interoperate with existing peers, so the mistake may
spread through the ecosystem unnoticed. Later, when new values are
defined, updated peers will discover that the metaphorical joint in the
protocol has rusted shut and the new values cannot be deployed without
interoperabilit
To avoid this problem, this document reserves some currently unused values for TLS implementations to advertise at random. Correctly implemented peers will ignore these values and interoperate. Peers that do not tolerate unknown values will fail to interoperate, revealing the mistake before it is widespread.¶
In keeping with the rusted joint metaphor, this technique is called "GREASE" (Generate Random Extensions And Sustain Extensibility).¶
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
2. GREASE Values
This document reserves a number of TLS protocol values, referred to as GREASE values. These values were allocated sparsely to discourage server implementations from conditioning on them. For convenience, they were also chosen so all types share a number scheme with a consistent pattern while avoiding collisions with any existing applicable registries in TLS.¶
The following values are reserved as GREASE values for cipher suites
and Application
The following values are reserved as GREASE values for extensions, named groups, signature algorithms, and versions:¶
The values allocated above are thus no longer available for use as TLS or DTLS [RFC6347] version numbers.¶
The following values are reserved as GREASE values for Psk
3. Client-Initiated Extension Points
Most extension points in TLS are offered by the client and selected by the server. This section details client and server behavior around GREASE values for these.¶
3.1. Client Behavior
When sending a ClientHello, a client MAY behave as follows:¶
Clients MUST reject GREASE values when negotiated by the server. In particular, the client MUST fail the connection if a GREASE value appears in any of the following:¶
Note that this can be implemented without special processing on the client. The client is already required to reject unknown server-selected values, so it may leave GREASE values as unknown and reuse the existing logic.¶
3.2. Server Behavior
When processing a ClientHello, servers MUST NOT treat GREASE values differently from any unknown value. Servers MUST NOT negotiate any GREASE value when offered in a ClientHello. Servers MUST correctly ignore unknown values in a ClientHello and attempt to negotiate with one of the remaining parameters. (There may not be any known parameters remaining, in which case parameter negotiation will fail.)¶
Note that these requirements are restatements or corollaries of existing server requirements in TLS.¶
4. Server-Initiated Extension Points
Some extension points are offered by the server and selected by the client. This section details client and server behavior around GREASE values for these.¶
4.1. Server Behavior
When sending a Certificate
When sending a New
Servers MUST reject GREASE values when negotiated by the client. In particular, the server MUST fail the connection if a GREASE value appears in any of the following:¶
Note that this can be implemented without special processing on the server. The server is already required to reject unknown client-selected values, so it may leave GREASE values as unknown and reuse the existing logic.¶
4.2. Client Behavior
When processing a Certificate
Note that these requirements are restatements or corollaries of existing client requirements in TLS.¶
5. Sending GREASE Values
Implementations advertising GREASE values SHOULD select them at random. This is intended to encourage implementations to ignore all unknown values rather than any individual value. Implementations MUST honor protocol specifications when sending GREASE values. For instance, Section 4.2 of [RFC8446] forbids duplicate extension types within a single extension block. Implementations sending multiple GREASE extensions in a single block must therefore ensure the same value is not selected twice.¶
Implementations SHOULD balance diversity in GREASE advertisements with determinism.
For example, a client that randomly varies GREASE value positions for each
connection may only fail against a broken server with some probability. This
risks the failure being masked by automatic retries. A client that positions
GREASE values deterministical
6. IANA Considerations
This document updates the "TLS Cipher Suites" registry, available at
<https://
This document updates the "TLS Supported Groups" registry, available at
<https://
This document updates the "TLS ExtensionType Values" registry, available at
<https://
This document updates the "TLS Application
7. Security Considerations
GREASE values cannot be negotiated, so they do not directly impact the security of TLS connections.¶
Historically, when interoperabilit
If an implementation does not select GREASE values at random, it is possible it will allow for fingerprinting of the implementation or perhaps even of individual users. This can result in a negative impact to a user's privacy.¶
8. Normative References
- [RFC2119]
-
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10
.17487 , , <https:///RFC2119 www >..rfc -editor .org /info /rfc2119 - [RFC5246]
-
Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, DOI 10
.17487 , , <https:///RFC5246 www >..rfc -editor .org /info /rfc5246 - [RFC6347]
-
Rescorla, E. and N. Modadugu, "Datagram Transport Layer Security Version 1.2", RFC 6347, DOI 10
.17487 , , <https:///RFC6347 www >..rfc -editor .org /info /rfc6347 - [RFC7301]
-
Friedl, S., Popov, A., Langley, A., and E. Stephan, "Transport Layer Security (TLS) Application
-Layer , RFC 7301, DOI 10Protocol Negotiation Extension" .17487 , , <https:///RFC7301 www >..rfc -editor .org /info /rfc7301 - [RFC8174]
-
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10
.17487 , , <https:///RFC8174 www >..rfc -editor .org /info /rfc8174 - [RFC8446]
-
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10
.17487 , , <https:///RFC8446 www >..rfc -editor .org /info /rfc8446
Acknowledgments
The author would like to thank Adam Langley, Nick Harper, and Steven Valdez for their feedback and suggestions. In addition, the rusted joint metaphor is originally due to Adam Langley.¶