Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support for TLS_PSK_WITH_NULL_SHA256 #288

Open
lomer2 opened this issue Nov 6, 2024 · 4 comments
Open

support for TLS_PSK_WITH_NULL_SHA256 #288

lomer2 opened this issue Nov 6, 2024 · 4 comments
Labels
feature New feature or enhancement request

Comments

@lomer2
Copy link

lomer2 commented Nov 6, 2024

Hi,
I would like to add support to TLS_PSK_WITH_NULL_SHA256 cipher suite.
Is this a planned feature?
is it more to it than to add an appropriate line in the _nx_crypto_ciphersuite_lookup_table table?
Thanks!

@lomer2 lomer2 added the feature New feature or enhancement request label Nov 6, 2024
@fdesbiens
Copy link

Hi @lomer2! Thank you for reaching out.

This is not on the roadmap right now. I am not a hardcore TLS guy so I am not sure how complicated implementation would be. I will discuss this with the team and come back to you.

@fdesbiens
Copy link

Hi @lomer2.

I appreciate your patience. The core team discussed your request last week. Unless we are mistaken, it appears you want to use NetX Secure TLS 1.2 with a PSK and zero encryption to achieve some authentication and integrity checking only on TLS messages, leaving payloads unencrypted in plaintext.

This use case resembles IPSec AH mode. Based on industry practices, NIST, and other authoritative sources, it should be avoided. It is completely eliminated in TLS 1.3.

So, our initial reaction would be to decline your request. We have trouble justifying why we would add such a weak security profile to the code base. That said, feel free to share more information about your use case and requirements. This could lead us to reconsider. I will leave the issue open for now as we have this conversation.

Best Regards,

Frédéric

@lomer2
Copy link
Author

lomer2 commented Nov 18, 2024

Thanks @fdesbiens,
I understand the reasoning, I will explain the use case and see if it makes sense.
The use case in mind is an automotive sensor communicating with the vehicle's (OEM-defined) main controller over an internal in-vehicle network. The security requirements over this communication line require authentication only (no requirement for encryption). The main challenge with ECDSA/RSA-based cipher suites is the provisioning of the certificates during manufacturing, which is the reason we prefer using a PSK. Among the PSK ciphersuites, TLS_PSK_WITH_NULL_SHA256 is the only one that is supported by the OEM stack.
While the downsides of using the TLS_PSK_WITH_NULL_SHA256 are understood, we believe it is justified in this case.
Thanks!
Omer

@fdesbiens
Copy link

Thank you for those details, @lomer2.

I will bring this information back to the team for further discussion.

From a long-term support perspective, I wonder if there could be better alternatives to fulfil your requirements given the cipher suite is removed in TLS 1.3.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature New feature or enhancement request
Projects
None yet
Development

No branches or pull requests

2 participants