On Fri, Nov 22, 2019 at 08:18:47PM +0100, Hubert Kario wrote:
> On Friday, 22 November 2019 03:25:24 CET, David Benjamin wrote:
> > On Fri, Nov 22, 2019 at 8:35 AM Salz, Rich wrote:
> >
> > > > ...
> > > SHA-1 signature hashes in TLS 1.2" draft available
> > > https://datatracker.ietf.org/doc/dra
This is a bit of a shameless plug, but I think it is important to cite papers
that show that the use of weak hash functions for TLS signatures is actually
exploitable.
As far as I know, the last round of deprecating MD5 in TLS signatures was
triggered by the SLOTH attack:
https://www.mitls.org
Issues
--
* tlswg/draft-ietf-tls-esni (+0/-3/💬4)
2 issues received 4 new comments:
- #188 "HKDF-Extract(0, Z)" (3 by chris-wood, ekr, sayrer)
https://github.com/tlswg/draft-ietf-tls-esni/issues/188
- #149 Replay attack and timestamp (1 by huitema)
https://github.com/tlswg/draft-ie