1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
|
Internet Engineering Task Force (IETF) D. Benjamin
Request for Comments: 8701 Google LLC
Category: Informational January 2020
ISSN: 2070-1721
Applying Generate Random Extensions And Sustain Extensibility (GREASE)
to TLS Extensibility
Abstract
This document describes GREASE (Generate Random Extensions And
Sustain Extensibility), a mechanism to prevent extensibility failures
in the TLS ecosystem. It reserves a set of TLS protocol values that
may be advertised to ensure peers correctly handle unknown values.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are candidates for any level of Internet
Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc8701.
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction
1.1. Requirements Language
2. GREASE Values
3. Client-Initiated Extension Points
3.1. Client Behavior
3.2. Server Behavior
4. Server-Initiated Extension Points
4.1. Server Behavior
4.2. Client Behavior
5. Sending GREASE Values
6. IANA Considerations
7. Security Considerations
8. Normative References
Acknowledgments
Author's Address
1. Introduction
The TLS protocol [RFC8446] includes several points of extensibility,
including the list of cipher suites and several lists of extensions.
The values transmitted in these lists identify implementation
capabilities. TLS follows a model where one side, usually the
client, advertises capabilities, and the peer, usually the server,
selects them. The responding side must ignore unknown values so that
new capabilities may be introduced to the ecosystem while maintaining
interoperability.
However, bugs may cause an implementation to reject unknown values.
It will interoperate with existing peers, so the mistake may spread
through the ecosystem unnoticed. Later, when new values are defined,
updated peers will discover that the metaphorical joint in the
protocol has rusted shut and the new values cannot be deployed
without interoperability failures.
To avoid this problem, this document reserves some currently unused
values for TLS implementations to advertise at random. Correctly
implemented peers will ignore these values and interoperate. Peers
that do not tolerate unknown values will fail to interoperate,
revealing the mistake before it is widespread.
In keeping with the rusted joint metaphor, this technique is called
"GREASE" (Generate Random Extensions And Sustain Extensibility).
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
2. GREASE Values
This document reserves a number of TLS protocol values, referred to
as GREASE values. These values were allocated sparsely to discourage
server implementations from conditioning on them. For convenience,
they were also chosen so all types share a number scheme with a
consistent pattern while avoiding collisions with any existing
applicable registries in TLS.
The following values are reserved as GREASE values for cipher suites
and Application-Layer Protocol Negotiation (ALPN) [RFC7301]
identifiers:
{0x0A,0x0A}
{0x1A,0x1A}
{0x2A,0x2A}
{0x3A,0x3A}
{0x4A,0x4A}
{0x5A,0x5A}
{0x6A,0x6A}
{0x7A,0x7A}
{0x8A,0x8A}
{0x9A,0x9A}
{0xAA,0xAA}
{0xBA,0xBA}
{0xCA,0xCA}
{0xDA,0xDA}
{0xEA,0xEA}
{0xFA,0xFA}
The following values are reserved as GREASE values for extensions,
named groups, signature algorithms, and versions:
0x0A0A
0x1A1A
0x2A2A
0x3A3A
0x4A4A
0x5A5A
0x6A6A
0x7A7A
0x8A8A
0x9A9A
0xAAAA
0xBABA
0xCACA
0xDADA
0xEAEA
0xFAFA
The values allocated above are thus no longer available for use as
TLS or DTLS [RFC6347] version numbers.
The following values are reserved as GREASE values for
PskKeyExchangeModes:
0x0B
0x2A
0x49
0x68
0x87
0xA6
0xC5
0xE4
3. Client-Initiated Extension Points
Most extension points in TLS are offered by the client and selected
by the server. This section details client and server behavior
around GREASE values for these.
3.1. Client Behavior
When sending a ClientHello, a client MAY behave as follows:
* A client MAY select one or more GREASE cipher suite values and
advertise them in the "cipher_suites" field.
* A client MAY select one or more GREASE extension values and
advertise them as extensions with varying length and contents.
* A client MAY select one or more GREASE named group values and
advertise them in the "supported_groups" extension, if sent. It
MAY also send KeyShareEntry values for a subset of those selected
in the "key_share" extension. For each of these, the
"key_exchange" field MAY be any value.
* A client MAY select one or more GREASE signature algorithm values
and advertise them in the "signature_algorithms" or
"signature_algorithms_cert" extensions, if sent.
* A client MAY select one or more GREASE version values and
advertise them in the "supported_versions" extension, if sent.
* A client MAY select one or more GREASE PskKeyExchangeMode values
and advertise them in the "psk_key_exchange_modes" extension, if
sent.
* A client MAY select one or more GREASE ALPN identifiers and
advertise them in the "application_layer_protocol_negotiation"
extension, if sent.
Clients MUST reject GREASE values when negotiated by the server. In
particular, the client MUST fail the connection if a GREASE value
appears in any of the following:
* The "version" value in a ServerHello or HelloRetryRequest
* The "cipher_suite" value in a ServerHello
* Any ServerHello extension
* Any HelloRetryRequest, EncryptedExtensions, or Certificate
extension in TLS 1.3
* The "namedcurve" value in a ServerKeyExchange for an Ephemeral
Elliptic Curve Diffie-Hellman (ECDHE) cipher in TLS 1.2 [RFC5246]
or earlier
* The signature algorithm in a ServerKeyExchange signature in TLS
1.2 or earlier
* The signature algorithm in a server CertificateVerify signature in
TLS 1.3
Note that this can be implemented without special processing on the
client. The client is already required to reject unknown server-
selected values, so it may leave GREASE values as unknown and reuse
the existing logic.
3.2. Server Behavior
When processing a ClientHello, servers MUST NOT treat GREASE values
differently from any unknown value. Servers MUST NOT negotiate any
GREASE value when offered in a ClientHello. Servers MUST correctly
ignore unknown values in a ClientHello and attempt to negotiate with
one of the remaining parameters. (There may not be any known
parameters remaining, in which case parameter negotiation will fail.)
Note that these requirements are restatements or corollaries of
existing server requirements in TLS.
4. Server-Initiated Extension Points
Some extension points are offered by the server and selected by the
client. This section details client and server behavior around
GREASE values for these.
4.1. Server Behavior
When sending a CertificateRequest in TLS 1.3, a server MAY behave as
follows:
* A server MAY select one or more GREASE extension values and
advertise them as extensions with varying length and contents.
* A server MAY select one or more GREASE signature algorithm values
and advertise them in the "signature_algorithms" or
"signature_algorithms_cert" extensions, if present.
When sending a NewSessionTicket message in TLS 1.3, a server MAY
select one or more GREASE extension values and advertise them as
extensions with varying length and contents.
Servers MUST reject GREASE values when negotiated by the client. In
particular, the server MUST fail the connection if a GREASE value
appears in any of the following:
* Any Certificate extension in TLS 1.3
* The signature algorithm in a client CertificateVerify signature
Note that this can be implemented without special processing on the
server. The server is already required to reject unknown client-
selected values, so it may leave GREASE values as unknown and reuse
the existing logic.
4.2. Client Behavior
When processing a CertificateRequest or NewSessionTicket, clients
MUST NOT treat GREASE values differently from any unknown value.
Clients MUST NOT negotiate any GREASE value when offered by the
server. Clients MUST correctly ignore unknown values offered by the
server and attempt to negotiate with one of the remaining parameters.
(There may not be any known parameters remaining, in which case
parameter negotiation will fail.)
Note that these requirements are restatements or corollaries of
existing client requirements in TLS.
5. Sending GREASE Values
Implementations advertising GREASE values SHOULD select them at
random. This is intended to encourage implementations to ignore all
unknown values rather than any individual value. Implementations
MUST honor protocol specifications when sending GREASE values. For
instance, Section 4.2 of [RFC8446] forbids duplicate extension types
within a single extension block. Implementations sending multiple
GREASE extensions in a single block must therefore ensure the same
value is not selected twice.
Implementations SHOULD balance diversity in GREASE advertisements
with determinism. For example, a client that randomly varies GREASE
value positions for each connection may only fail against a broken
server with some probability. This risks the failure being masked by
automatic retries. A client that positions GREASE values
deterministically over a period of time (such as a single software
release) stresses fewer cases but is more likely to detect bugs from
those cases.
6. IANA Considerations
This document updates the "TLS Cipher Suites" registry, available at
<https://www.iana.org/assignments/tls-parameters>:
+-------------+-------------+---------+-------------+-----------+
| Value | Description | DTLS-OK | Recommended | Reference |
+=============+=============+=========+=============+===========+
| {0x0A,0x0A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x1A,0x1A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x2A,0x2A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x3A,0x3A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x4A,0x4A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x5A,0x5A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x6A,0x6A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x7A,0x7A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x8A,0x8A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0x9A,0x9A} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xAA,0xAA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xBA,0xBA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xCA,0xCA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xDA,0xDA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xEA,0xEA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
| {0xFA,0xFA} | Reserved | Y | N | [RFC8701] |
+-------------+-------------+---------+-------------+-----------+
Table 1: Additions to the TLS Cipher Suites Registry
This document updates the "TLS Supported Groups" registry, available
at <https://www.iana.org/assignments/tls-parameters>:
+-------+-------------+---------+-------------+-----------+
| Value | Description | DTLS-OK | Recommended | Reference |
+=======+=============+=========+=============+===========+
| 2570 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 6682 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 10794 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 14906 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 19018 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 23130 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 27242 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 31354 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 35466 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 39578 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 43690 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 47802 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 51914 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 56026 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 60138 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
| 64250 | Reserved | Y | N | [RFC8701] |
+-------+-------------+---------+-------------+-----------+
Table 2: Additions to the TLS Supported Groups Registry
This document updates the "TLS ExtensionType Values" registry,
available at <https://www.iana.org/assignments/tls-extensiontype-
values>:
+-------+----------------+-------------+-------------+-----------+
| Value | Extension Name | TLS 1.3 | Recommended | Reference |
+=======+================+=============+=============+===========+
| 2570 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 6682 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 10794 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 14906 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 19018 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 23130 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 27242 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 31354 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 35466 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 39578 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 43690 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 47802 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 51914 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 56026 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 60138 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
| 64250 | Reserved | CH, CR, NST | N | [RFC8701] |
+-------+----------------+-------------+-------------+-----------+
Table 3: Additions to the TLS ExtensionType Values Registry
This document updates the "TLS Application-Layer Protocol Negotiation
(ALPN) Protocol IDs" registry, available at
<https://www.iana.org/assignments/tls-extensiontype-values>:
+----------+-------------------------+-----------+
| Protocol | Identification Sequence | Reference |
+==========+=========================+===========+
| Reserved | 0x0A 0x0A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x1A 0x1A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x2A 0x2A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x3A 0x3A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x4A 0x4A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x5A 0x5A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x6A 0x6A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x7A 0x7A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x8A 0x8A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0x9A 0x9A | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xAA 0xAA | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xBA 0xBA | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xCA 0xCA | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xDA 0xDA | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xEA 0xEA | [RFC8701] |
+----------+-------------------------+-----------+
| Reserved | 0xFA 0xFA | [RFC8701] |
+----------+-------------------------+-----------+
Table 4: Additions to the TLS Application-
Layer Protocol Negotiation (ALPN) Protocol IDs
Registry
7. Security Considerations
GREASE values cannot be negotiated, so they do not directly impact
the security of TLS connections.
Historically, when interoperability problems arise in deploying new
TLS features, implementations have used a fallback retry on error
with the feature disabled. This allows an active attacker to
silently disable the new feature. By preventing a class of such
interoperability problems, GREASE reduces the need for this kind of
fallback. Implementations SHOULD NOT retry with GREASE disabled on
connection failure. While allowing an attacker to disable GREASE is
unlikely to have immediate security consequences, such a fallback
would prevent GREASE from defending against extensibility failures.
If an implementation does not select GREASE values at random, it is
possible it will allow for fingerprinting of the implementation or
perhaps even of individual users. This can result in a negative
impact to a user's privacy.
8. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246,
DOI 10.17487/RFC5246, August 2008,
<https://www.rfc-editor.org/info/rfc5246>.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
January 2012, <https://www.rfc-editor.org/info/rfc6347>.
[RFC7301] Friedl, S., Popov, A., Langley, A., and E. Stephan,
"Transport Layer Security (TLS) Application-Layer Protocol
Negotiation Extension", RFC 7301, DOI 10.17487/RFC7301,
July 2014, <https://www.rfc-editor.org/info/rfc7301>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
<https://www.rfc-editor.org/info/rfc8446>.
Acknowledgments
The author would like to thank Adam Langley, Nick Harper, and Steven
Valdez for their feedback and suggestions. In addition, the rusted
joint metaphor is originally due to Adam Langley.
Author's Address
David Benjamin
Google LLC
Email: davidben@google.com
|