Re: [TLS] WGLC for draft-ietf-tls-cached-info-19

2015-09-10 Thread Hannes Tschofenig
Hi Martin, thanks for your feedback. I have discussed the topic with my co-worker Manuel. Another way of seeing the use of the hash by the client is to help the server to select the pick certificate (or other cached data). It does not have a security purpose as such, it is only a way to prevent t

Re: [TLS] WGLC for draft-ietf-tls-cached-info-19

2015-09-10 Thread Martin Thomson
Hi Hannes, I've followed a similar chain of thought myself. I think that the right answer here is similar to what you describe: the security of TLS does not depend on the presence of the certificate at all, rather it depends on the use of a private key that the client trusts. That most clients r

[TLS] PR for PSS support

2015-09-10 Thread Eric Rescorla
https://github.com/tlswg/tls13-spec/pull/239 Based on the WG discussion, I've created a PR for adding support for PSS. The basic tactic I took is: - All in-protocol RSA signatures (i.e., in CertificateVerify) are PSS - You must use MGF1 with the same hash as you used for the content. - I added a

Re: [TLS] PR for PSS support

2015-09-10 Thread Russ Housley
This text appears in two places (lines 3026 and 3180) +Only RSA signatures based on RSASSA-PSS MAY be used, regardless of whether +RSASSA-PKCS-v1_5 appears in "signature_algorithms". I think it would be better to say: +RSA signatures MUST be based on RSASSA-PSS, regardless of whether +RSASSA-PKC