utls/testdata
Filippo Valsorda 89df05a1c4 crypto/tls: make cipher suite preference ordering automatic
We now have a (well, two, depending on AES hardware support) universal
cipher suite preference order, based on their security and performance.
Peer and application lists are now treated as filters (and AES hardware
support hints) that are applied to this universal order.

This removes a complex and nuanced decision from the application's
responsibilities, one which we are better equipped to make and which
applications usually don't need to have an opinion about. It also lets
us worry less about what suites we support or enable, because we can be
confident that bad ones won't be selected over good ones.

This also moves 3DES suites to InsecureCipherSuites(), even if they are
not disabled by default. Just because we can keep them as a last resort
it doesn't mean they are secure. Thankfully we had not promised that
Insecure means disabled by default.

Notable test changes:

  - TestCipherSuiteCertPreferenceECDSA was testing that we'd pick the
    right certificate regardless of CipherSuite ordering, which is now
    completely ignored, as tested by TestCipherSuitePreference. Removed.

  - The openssl command of TestHandshakeServerExportKeyingMaterial was
    broken for TLS 1.0 in CL 262857, but its golden file was not
    regenerated, so the test kept passing. It now broke because the
    selected suite from the ones in the golden file changed.

  - In TestAESCipherReordering, "server strongly prefers AES-GCM" is
    removed because there is no way for a server to express a strong
    preference anymore; "client prefers AES-GCM and AES-CBC over ChaCha"
    switched to ChaCha20 when the server lacks AES hardware; and finally
    "client supports multiple AES-GCM" changed to always prefer AES-128
    per the universal preference list.

    * this is going back on an explicit decision from CL 262857, and
      while that client order is weird and does suggest a strong dislike
      for ChaCha20, we have a strong dislike for software AES, so it
      didn't feel worth making the logic more complex

  - All Client-* golden files had to be regenerated because the
    ClientHello cipher suites have changed.
    (Even when Config.CipherSuites was limited to one suite, the TLS 1.3
    default order changed.)

Fixes #45430
Fixes #41476 (as 3DES is now always the last resort)

Change-Id: If5f5d356c0f8d1f1c7542fb06644a478d6bad1e5
Reviewed-on: https://go-review.googlesource.com/c/go/+/314609
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Go Bot <gobot@golang.org>
Reviewed-by: Roland Shoemaker <roland@golang.org>
Trust: Filippo Valsorda <filippo@golang.org>
2021-05-08 05:15:48 +00:00
..
Client-TLSv10-ClientCert-ECDSA-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-ClientCert-ECDSA-RSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-ClientCert-Ed25519 crypto/tls: add support for Ed25519 certificates in TLS 1.2 and 1.3 2019-05-17 16:13:45 +00:00
Client-TLSv10-ClientCert-RSA-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-ClientCert-RSA-RSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-ECDHE-ECDSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-ECDHE-RSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-Ed25519 crypto/tls: add support for Ed25519 certificates in TLS 1.2 and 1.3 2019-05-17 16:13:45 +00:00
Client-TLSv10-ExportKeyingMaterial crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv10-RSA-RC4 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv11-ECDHE-ECDSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv11-ECDHE-RSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv11-Ed25519 crypto/tls: add support for Ed25519 certificates in TLS 1.2 and 1.3 2019-05-17 16:13:45 +00:00
Client-TLSv11-RSA-RC4 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-AES128-GCM-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-AES128-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-AES256-GCM-SHA384 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ALPN crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ALPN-NoMatch crypto/tls: support AES-128-CBC cipher suites with SHA-256. 2016-08-18 21:46:46 +00:00
Client-TLSv12-ClientCert-ECDSA-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-ECDSA-RSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-Ed25519 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-RSA-AES256-GCM-SHA384 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-RSA-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-RSA-RSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-RSA-RSAPKCS1v15 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ClientCert-RSA-RSAPSS crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-ECDSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-ECDSA-AES-GCM crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-ECDSA-AES128-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-ECDSA-AES256-GCM-SHA384 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-ECDSA-CHACHA20-POLY1305 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-RSA-AES crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-RSA-AES128-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ECDHE-RSA-CHACHA20-POLY1305 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-Ed25519 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-ExportKeyingMaterial crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-P256-ECDHE crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-RenegotiateOnce crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-RenegotiateTwice crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-RenegotiateTwiceRejected crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-RenegotiationRejected crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-RSA-RC4 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-SCT crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv12-X25519-ECDHE crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-AES128-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-AES256-SHA384 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ALPN crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-CHACHA20-SHA256 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ClientCert-ECDSA-RSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ClientCert-Ed25519 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ClientCert-RSA-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ClientCert-RSA-RSAPSS crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ECDSA crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-Ed25519 crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-ExportKeyingMaterial crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-HelloRetryRequest crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-KeyUpdate crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-P256-ECDHE crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Client-TLSv13-X25519-ECDHE crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
example-cert.pem crypto/tls: add examples for [Load]X509KeyPair 2018-04-30 17:25:27 +00:00
example-key.pem crypto/tls: add examples for [Load]X509KeyPair 2018-04-30 17:25:27 +00:00
Server-TLSv10-ECDHE-ECDSA-AES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv10-ExportKeyingMaterial crypto/tls: make cipher suite preference ordering automatic 2021-05-08 05:15:48 +00:00
Server-TLSv10-RSA-3DES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv10-RSA-AES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv10-RSA-RC4 crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv11-FallbackSCSV crypto/tls: enable TLS 1.3 and update tests 2018-11-12 20:44:39 +00:00
Server-TLSv11-RSA-RC4 crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-ALPN crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ALPN-NoMatch crypto/tls: enforce ALPN overlap when negotiated on both sides 2021-05-06 18:57:43 +00:00
Server-TLSv12-ALPN-NotConfigured crypto/tls: enforce ALPN overlap when negotiated on both sides 2021-05-06 18:57:43 +00:00
Server-TLSv12-ClientAuthRequestedAndECDSAGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ClientAuthRequestedAndEd25519Given crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ClientAuthRequestedAndGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ClientAuthRequestedAndPKCS1v15Given crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ClientAuthRequestedNotGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ECDHE-ECDSA-AES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-Ed25519 crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ExportKeyingMaterial crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-IssueTicket crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-IssueTicketPreDisable crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-P256 crypto/tls: re-enable RSA-PSS in TLS 1.2 again 2019-11-12 01:09:15 +00:00
Server-TLSv12-Resume crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-ResumeDisabled crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-RSA-3DES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-RSA-AES crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-RSA-AES-GCM crypto/tls: re-enable RSA-PSS in TLS 1.2 again 2019-11-12 01:09:15 +00:00
Server-TLSv12-RSA-AES256-GCM-SHA384 crypto/tls: re-enable RSA-PSS in TLS 1.2 again 2019-11-12 01:09:15 +00:00
Server-TLSv12-RSA-RC4 crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-RSA-RSAPKCS1v15 crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-RSA-RSAPSS crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv12-SNI crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-SNI-GetCertificate crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-SNI-GetCertificateNotFound crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv12-X25519 crypto/tls: re-enable RSA-PSS in TLS 1.2 again 2019-11-12 01:09:15 +00:00
Server-TLSv13-AES128-SHA256 crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
Server-TLSv13-AES256-SHA384 crypto/tls: implement TLS 1.3 PSK authentication (server side) 2018-11-12 20:43:35 +00:00
Server-TLSv13-ALPN crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ALPN-NoMatch crypto/tls: enforce ALPN overlap when negotiated on both sides 2021-05-06 18:57:43 +00:00
Server-TLSv13-ALPN-NotConfigured crypto/tls: enforce ALPN overlap when negotiated on both sides 2021-05-06 18:57:43 +00:00
Server-TLSv13-CHACHA20-SHA256 crypto/tls: implement TLS 1.3 PSK authentication (server side) 2018-11-12 20:43:35 +00:00
Server-TLSv13-ClientAuthRequestedAndECDSAGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ClientAuthRequestedAndEd25519Given crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ClientAuthRequestedAndGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ClientAuthRequestedNotGiven crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ECDHE-ECDSA-AES crypto/tls: implement TLS 1.3 PSK authentication (server side) 2018-11-12 20:43:35 +00:00
Server-TLSv13-Ed25519 crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ExportKeyingMaterial crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-HelloRetryRequest crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-IssueTicket crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-IssueTicketPreDisable crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-P256 crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-Resume crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-Resume-HelloRetryRequest crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-ResumeDisabled crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-RSA-RSAPSS crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-RSA-RSAPSS-TooSmall crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00
Server-TLSv13-X25519 crypto/tls: de-prioritize AES-GCM ciphers when lacking hardware support 2020-11-10 01:40:27 +00:00