Amazon Web Services (AWS) is dedicated to the responsible disclosure of security vulnerabilities.
We kindly ask that you do not open a public GitHub issue to report security concerns.
Instead, please submit the issue to the AWS Vulnerability Disclosure Program via HackerOne or send your report via email.
For more details, visit the AWS Vulnerability Reporting Page.
Thank you in advance for collaborating with us to help protect our customers.
Security is a shared responsibility between s2n-tls and the applications that integrate with it.
s2n-tls is responsible for correctly and securely implementing the TLS protocol, its features, and supported cryptographic algorithms, and for providing safe defaults and secure building blocks for applications to use. While s2n-tls avoids implementing rarely used options and extensions, it continues to support older algorithms and functionality that are necessary for backward compatibility and interoperability, even when they are no longer considered best in class.
Applications integrating with s2n-tls are responsible for the security of the host on which the process loading the s2n-tls library runs, and for configuring s2n-tls in a way that achieves their required security goals. This includes selecting an appropriate security policy that excludes any algorithms they consider insufficient, and correctly configuring and using features.
Given this shared responsibility, the following attacks are considered out of scope for s2n-tls:
- On-host side-channel attacks via CPU/hardware flaws such as Meltdown/Spectre
- Attacks requiring on-host root access to processes, memory, sockets or files
- Attacks involving physical fault injection, such as high voltage and temperatures or electromagnetic pulses
- Side-channel attacks requiring physical observation to detect
If you are unsure whether an issue falls in or out of scope, we encourage you to report it; we'd rather investigate a potential concern than miss a real one. Even for out-of-scope attacks, we may still choose to apply mitigations after weighing the potential cost to performance, maintainability, and complexity. All reported findings will be investigated and mitigations will be decided on a case-by-case basis.
The following adversarial models describe the threats that s2n-tls is designed to defend against. The degree of protection achieved depends on the security policy selected by the application. For example, forward secrecy against long-term key compromise requires ephemeral key exchange, and protection against harvest-now-decrypt-later attacks requires post-quantum key exchange. See the Security Policies section of the Usage Guide for more information on selecting an appropriate policy.
An active network attacker with complete control over the network used to communicate between a client and server. This attacker can:
- Intercept, modify, and send all messages sent on public network channels
- Attempt to downgrade the protocol version or cryptographic parameters negotiated between a client and server
- Obtain long-term secrets (e.g. private keys) of any client or server after a session is complete
- Exploit weak long-term keys given sufficient computation
- Exploit weak hash functions used in key derivation, HMAC, or signatures
- Exploit timing differences practically measurable over a network (e.g. remote timing side-channel attacks)
- Record encrypted traffic now for future decryption once a cryptographically relevant quantum computer is available (harvest now, decrypt later)
In addition to the network adversary capabilities above, a malicious client may:
- Attempt to bypass client certificate-based authentication
- Send crafted payloads (e.g. client certificates) to exploit flaws in parsers
- Offer only weak cryptographic parameters (e.g. ciphersuites, key exchange groups) to influence the server's negotiation choices
- Attempt to spoof other trusted clients by manipulating session identifiers
- Cause denial of service through resource exhaustion
In addition to the network adversary capabilities above, a malicious server may:
- Attempt to downgrade the connection by offering only weak ciphersuites, keys, DH groups, or hash functions
- Send crafted payloads (e.g. server certificates, extensions, handshake messages) to exploit flaws in parsers
- Present revoked or misissued certificates
Given the adversarial models above, the following are examples of security-relevant issues that should be reported in accordance with Reporting Security Issues:
- Implementation defects that compromise confidentiality, integrity, or availability (e.g. memory safety bugs, undefined behavior)
- Logic bugs that lead to incorrect TLS negotiation, handshake errors, or authentication bypass
- Negotiation of cryptographic algorithms not specified in the configured security policy
- Flaws in default configurations that could lead to insecure operation
The following are generally not considered vulnerabilities in this project's context:
- Application misuse of APIs that behave as documented
- Issues in the operating environment (e.g. OS, networking stack, hardware)
- Usage patterns documented as warnings in the Usage Guide
If you are unsure whether an issue is security-relevant, please err on the side of caution and report it through the Reporting Security Issues process.
If you package or distribute s2n-tls, or use s2n-tls as part of a large multi-user service, you may be eligible for pre-notification of future s2n-tls releases. Please contact [email protected].