TLS_FALLBACK_SCSV Not Supported
TLS_FALLBACK_SCSV Not Supported
Description
This vulnerability indicates that the server does not support TLS_FALLBACK_SCSV
(Signaling Cipher Suite Value), which is a mechanism designed to prevent protocol downgrade attacks in SSL/TLS connections.
TLS_FALLBACK_SCSV
is crucial because:
- It allows clients to indicate when they're falling back to a lower protocol version due to connection failures.
- It enables servers to detect and prevent malicious downgrade attempts.
- It helps maintain the highest possible level of security in SSL/TLS connections.
When TLS_FALLBACK_SCSV
is not supported, the server becomes vulnerable to:
- Protocol Downgrade Attacks: An attacker can force the use of older, less secure protocol versions.
- Man-in-the-Middle (MitM) Attacks: Downgrading to a weaker protocol can make it easier for attackers to intercept and decrypt communications.
- Exploitation of Vulnerabilities in Older Protocols: Older SSL/TLS versions may have known vulnerabilities that can be exploited once a downgrade occurs.
Example Scenario:
An attacker intercepts the initial handshake between a client and server. The attacker manipulates the connection to fail, causing the client to retry with a lower protocol version. Without TLS_FALLBACK_SCSV
, the server accepts this downgrade, potentially exposing the connection to vulnerabilities in the older protocol version.
The absence of TLS_FALLBACK_SCSV
support violates best practices for SSL/TLS security and can impact compliance with various security standards and regulations.
Recommendation
When TLS_FALLBACK_SCSV (Signaling Cipher Suite Value) is not supported, it can lead to potential downgrade attacks. Here are strategies to mitigate this risk:
Proactive Strategies
-
Disable SSL/TLS Version Fallback: Configure servers to disable fallback to older SSL/TLS versions. This prevents attackers from forcing connections to use vulnerable protocols.
-
Enforce Minimum TLS Version: Set a minimum acceptable TLS version (e.g., TLS 1.2) on both client and server sides to prevent downgrade to vulnerable versions.
-
Regular Security Scans: Conduct periodic scans of your infrastructure to identify and address any TLS configuration weaknesses.
-
Monitor for Unusual TLS Negotiation Patterns: Implement monitoring to detect attempts at forcing protocol downgrades.
Implementation Examples
- Nginx Configuration
To disable SSL/TLS version fallback and enforce a minimum TLS version in Nginx:
server {
listen 443 ssl;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256';
# Other SSL settings...
}
- Apache Configuration
For Apache, use the following configuration to achieve similar results:
<VirtualHost *:443>
SSLEngine on
SSLProtocol -all +TLSv1.2 +TLSv1.3
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256
SSLHonorCipherOrder on
# Other SSL settings...
</VirtualHost>
- OpenSSL Command for Testing
Use OpenSSL to test your server's TLS configuration:
openssl s_client -connect example.com:443 -tls1_2
This command attempts to establish a TLS 1.2 connection. If successful, it indicates that your server is correctly configured to use modern TLS versions.
Monitoring for Downgrade Attempts
- Using fail2ban
You can use fail2ban
to monitor logs for potential downgrade attempts:
- Create a custom filter in
/etc/fail2ban/filter.d/tls-downgrade.conf
:
[Definition]
failregex = SSL routines:SSL23_GET_CLIENT_HELLO:unsupported protocol.*client=<HOST>
- Add a jail in
/etc/fail2ban/jail.local
:
[tls-downgrade]
enabled = true
filter = tls-downgrade
logpath = /var/log/nginx/error.log
maxretry = 3
bantime = 3600
- Restart fail2ban:
sudo systemctl restart fail2ban
This configuration will ban IP addresses that make repeated attempts to connect using unsupported (likely older) SSL/TLS versions.
By implementing these measures, you can significantly reduce the risk of TLS downgrade attacks, even when TLS_FALLBACK_SCSV is not supported.
Links
- RFC 7507 - TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks
- OWASP TLS Cheat Sheet
- NIST Guidelines for TLS Implementations
Standards
- SOC2_CONTROLS:
- CC_6_7
- CC_7_1
- CCPA:
- CCPA_1798_150
- GDPR:
- ART_32
- PCI_STANDARDS:
- REQ_2_3
- REQ_4_1
- REQ_6_5