Actions
Bug #865
closedFix TLS 1.3 ciphersuite selection when using OpenSSL 1.1.1
Start date:
2019-01-02
Due date:
% Done:
100%
Estimated time:
Module:
dcmtls
Operating System:
Compiler:
Description
OpenSSL 1.1.1 has introduced new APIs for managing TLS 1.3 ciphersuites, which are handled completely separate from the older SSL3 and TLS 1.0-1.2 ciphersuites.
This leads to unexpected behaviour in DCMTK: A connection between echoscu --profile-null
and storescp --profile-bcp195-nd
should normally fail, because storescp should refuse to negotiate the NULL cipher. When using OpenSSL 1.1.1, however, the connection succeeds because a TLS 1.3 cipher is selected instead. While the connection is arguably secure, this is not what a user would expect when explicitly asking for the NULL (unencrypted) ciphersuite, and it breaks several of DCMTK's integration test cases.
- TLS 1.3 support is disabled for the historic DICOM security profiles (3DES, AES, NULL)
- TLS 1.3 support is enabled for the newer DICOM security profiles, but ciphersuites are restricted to those that fulfill the BCP195 requirements.
Updated by Marco Eichelberg over 6 years ago
- Status changed from New to Closed
- Assignee set to Marco Eichelberg
- % Done changed from 0 to 100
Closed by commit #b9e37ae60.
Actions