Skip to content

TLS_FALLBACK_SCSV Not Supported

TLS_FALLBACK_SCSV Not Supported

Description

This vulnerability indicates that the server does not support TLS_FALLBACK_SCSV (Signaling Cipher Suite Value), which is a mechanism designed to prevent protocol downgrade attacks in SSL/TLS connections.

TLS_FALLBACK_SCSV is crucial because:

  1. It allows clients to indicate when they're falling back to a lower protocol version due to connection failures.
  2. It enables servers to detect and prevent malicious downgrade attempts.
  3. It helps maintain the highest possible level of security in SSL/TLS connections.

When TLS_FALLBACK_SCSV is not supported, the server becomes vulnerable to:

  1. Protocol Downgrade Attacks: An attacker can force the use of older, less secure protocol versions.
  2. Man-in-the-Middle (MitM) Attacks: Downgrading to a weaker protocol can make it easier for attackers to intercept and decrypt communications.
  3. Exploitation of Vulnerabilities in Older Protocols: Older SSL/TLS versions may have known vulnerabilities that can be exploited once a downgrade occurs.

Example Scenario:

An attacker intercepts the initial handshake between a client and server. The attacker manipulates the connection to fail, causing the client to retry with a lower protocol version. Without TLS_FALLBACK_SCSV, the server accepts this downgrade, potentially exposing the connection to vulnerabilities in the older protocol version. The absence of TLS_FALLBACK_SCSV support violates best practices for SSL/TLS security and can impact compliance with various security standards and regulations.

Recommendation

When TLS_FALLBACK_SCSV (Signaling Cipher Suite Value) is not supported, it can lead to potential downgrade attacks. Here are strategies to mitigate this risk:

Proactive Strategies

  1. Disable SSL/TLS Version Fallback: Configure servers to disable fallback to older SSL/TLS versions. This prevents attackers from forcing connections to use vulnerable protocols.

  2. Enforce Minimum TLS Version: Set a minimum acceptable TLS version (e.g., TLS 1.2) on both client and server sides to prevent downgrade to vulnerable versions.

  3. Regular Security Scans: Conduct periodic scans of your infrastructure to identify and address any TLS configuration weaknesses.

  4. Monitor for Unusual TLS Negotiation Patterns: Implement monitoring to detect attempts at forcing protocol downgrades.

Implementation Examples

  1. Nginx Configuration

To disable SSL/TLS version fallback and enforce a minimum TLS version in Nginx:

server {
    listen 443 ssl;
    ssl_protocols TLSv1.2 TLSv1.3;
    ssl_prefer_server_ciphers on;
    ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256';
    # Other SSL settings...
}
  1. Apache Configuration

For Apache, use the following configuration to achieve similar results:

<VirtualHost *:443>
    SSLEngine on
    SSLProtocol -all +TLSv1.2 +TLSv1.3
    SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256
    SSLHonorCipherOrder on
    # Other SSL settings...
</VirtualHost>
  1. OpenSSL Command for Testing

Use OpenSSL to test your server's TLS configuration:

openssl s_client -connect example.com:443 -tls1_2

This command attempts to establish a TLS 1.2 connection. If successful, it indicates that your server is correctly configured to use modern TLS versions.

Monitoring for Downgrade Attempts

  • Using fail2ban

You can use fail2ban to monitor logs for potential downgrade attempts:

  1. Create a custom filter in /etc/fail2ban/filter.d/tls-downgrade.conf:
[Definition]
failregex = SSL routines:SSL23_GET_CLIENT_HELLO:unsupported protocol.*client=<HOST>
  1. Add a jail in /etc/fail2ban/jail.local:
[tls-downgrade]
enabled = true
filter = tls-downgrade
logpath = /var/log/nginx/error.log
maxretry = 3
bantime = 3600
  1. Restart fail2ban:
sudo systemctl restart fail2ban

This configuration will ban IP addresses that make repeated attempts to connect using unsupported (likely older) SSL/TLS versions.

By implementing these measures, you can significantly reduce the risk of TLS downgrade attacks, even when TLS_FALLBACK_SCSV is not supported.

Standards

  • SOC2_CONTROLS:
    • CC_6_7
    • CC_7_1
  • CCPA:
    • CCPA_1798_150
  • GDPR:
    • ART_32
  • PCI_STANDARDS:
    • REQ_2_3
    • REQ_4_1
    • REQ_6_5