Closed
Milestone
Jun 15, 2017–Jul 25, 2018
gnutls 3.6.x with TLS 1.3
The tasks required to be completed to bring TLS 1.3 (1rtt) in GnuTLS.
Burndown chart
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
81
- handle fragmented asynchronous handshake messages
- post-handshake auth: test no re-authentication
- post handshake authentication: verify that we tolerate application data before certificate is received
- post-handshake authentication: verify that it works over PSK (and resumption) if allowed by the protocol
- post-handshake authentication: interop test with openssl fails
- key update: interop test with openssl fails
- go through implementation notes
- supplemental data: address operation under TLS1.3
- session resumption: ensure that follow up sessions don't happen indefinitely
- tls1.3: the pre-shared-key extension may not be the last
- in HRR handshake CCS is sent at wrong time by gnutls
- TLS1.3 safe removal of the padding imposes a significant performance penalty
- TLS1.3: rename extension supported ECC to supported groups
- psk: add deterministic detection of session tickets
- handshake: there are no callbacks for asynchronous handshake messages
- do not send TLS1.3 extensions under DTLS
- Investigate TLS1.3 psk interop issue with openssl
- reference counting of key material is incorrect under TLS1.3
- TLS1.3 draft 26 interop
- support PSK without DH or ECDH key exchange
- testsuite: generic tests are split into TLS1.2 and TLS1.3 version
- update to tlsfuzzer with tls1.3
- draft-ietf-tls-tls13-26: supported_versions must not negotiate pre-TLS1.3
- draft-ietf-tls-tls13-25: new AEAD data form
- draft-ietf-tls-tls-24: hello retry request must retain supported_versions version
- draft-ietf-tls-tls13-24: require the presence of supported versions
- draft-ietf-tls-tls13-23: signature_algorithms: support rsa_pss_pss
- draft-ietf-tls-tls13-23: renumber the key_share extension
- draft-ietf-tls-tls13-24: follow the backwards compatibility appendix when needed
- draft-ietf-tls-tls13-22: record legacy_record_version is for TLS1.2
- draft-ietf-tls-tls13-22: add support for changecipherspec
- draft-ietf-tls-tls13-22: resumption should not enforce SNI match
- draft-ietf-tls-tls13-22: supported_versions extension is sent by server
- draft-ietf-tls-tls13-22: supported versions should be sent in HelloRetryRequest
- draft-ietf-tls-tls13-22: HelloRetryRequest has the format of serverhello
- draft-ietf-tls-tls13-22: HelloRetryRequest random is fixed
- draft-ietf-tls-tls13-22: add support for new server hello format
- draft-ietf-tls-tls13-22: allow session resumption with different SNI
- RFC: Enabling the various key exchange methods under TLS1.3
- Rethink internal function _gnutls_psk_pwd_find_entry()
- Elliptic curve group server precedence not possible
- Add support for the latest/last TLS1.3 draft
- Move the session ticket buffer outside of the TLS 1.2 session ticket extension
- nss keylog file: write keys after key update
- PRF backwards compatibility functions behavior under TLS1.3
- enhance automated test suite against openssl 1.1.1
- optional: ocsp transparent retrieval of responses
- certificate message: generate OCSP status extension
- Provide a consistent set of default ciphers across supported protocols
- Verify that second client hello keeps the same random value
- Support SSLKEYFILE env variable for tls 1.3
- add test cases for received RDN sequence
- create tests for TLS1.3 version rollback detection
- certificate message: parse OCSP status extension
- session resumption under TLS1.3
- add rfc5705 key generation
- reduce the need for multiple buffer structs
- handle hello retry request
- key share: add API to restrict/set the sent shares
- handshake: reduce memory usage
- handle extensions locally
- add client certificate authentication
- length hiding with TLS 1.3
- add TLS 1.3 key derivation
- add support for TLS 1.3 handshake process
- add support for encrypted extensions
- Continuously verify Ed25519 support in TLS
- improve server/client fuzzying infrastructure
- Add support for TLS 1.3 ECDSA signature algorithms
- optional: Add support for post-handshake authentication
- Add support for TLS Certificate Authorities extension [CertificateRequest]
- Add support for TLS 1.3 cookie extension
- Add support for TLS 1.3 basic extensions
- Support TLS 1.3 Key and IV Update
- Handle the key usage limits
- Add support for TLS 1.3 Record format
- Add support for TLS 1.3 Diffie-Hellman-PSK combo key exchange mode
- Add support for TLS 1.3 PSK key exchange mode
- Add support for TLS 1.3 Diffie-Hellman key exchange mode
- Add support for HKDF in nettle
- Add support for draft-jay-tls-psk-identity-extension