On Tue, Jul 14, 2015 at 11:31:26AM +0200, Hubert Kario wrote:

> > ========================================
> > All certificates provided by the server SHOULD be signed by a
> > hash/signature algorithm pair indicated by the client's
> > "signature_algorithms" extension (or the defaults assumed in
> > its absence), where possible. If the server cannot produce a
> > certificate chain that is signed only via the indicated supported
> > pairs, then it SHOULD continue the handshake by sending the
> > client a certificate chain of its choice that may include algorithms
> > that are not known to be supported by the client. If the client
> > cannot construct an acceptable chain using the provided certificates
> > and decides to abort the handshake, then it MUST send an
> > "unsupported_certificate" alert message and close the connection.
> > ========================================
> 
> What about the cert chain offered by client to server as a response to 
> Certificate Request message?
> 
> They are also under the limitation of using just the signature algorithms 
> advertised as supported by server.

Exactly the same strategy should apply when client certificates
are in use, send compatible if possible, else send something you
have.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to