I recently reviewed the most recent TLS 1.3 draft, and I must say that I am 
impressed; the protocol appears to be a significant improvement.  In 
particular, you simplify the protocol significantly, and as we all know, 
complexity is the enemy of security.  You also drop many of the weak options, 
such as RC4 and the export ciphers; that sounds like an excellent idea.

That said, I do see a few things that puzzle me:


-          When dealing with ECDSA signatures, the default hash algorithm is 
SHA1, and any other hash function needs to be specified explicitly.  Might I 
ask why that is?  No one has demonstrated a SHA1 collision yet; however people 
are creeping closer.  If you ask me (which you didn't, but I'll give my opinion 
anyways), the default should be (at least) SHA-256; you should allow SHA-1 as a 
downgrade option only if someone makes a strong case that they can implement 
ECDSA and the rest of TLS 1.3, but implementing SHA-256 is just too hard.  
Otherwise, it should be discarded just like the other known weak 
cryptographical primitives (such as RC4).

-          You also allow the provision of someone using MD5 as the hash 
algorithm.  Take the above comments about how SHA-1 is not a good idea, and 
multiply it by a factor of about 10.  I see no justification for allowing 
someone to use a known broken hash algorithm.

-          Given the general theme of simplification, I was a bit puzzled by 
something; you appear to provide two different solutions to "how do I quickly 
reestablish a TLS tunnel"; you have both 0-RTT and session resumption.  While 
both appear to have minor advantages over the other, I don't immediately see 
any real justification for including the complexity of both.  Now, it might be 
that I'm catching a draft in the middle, and that you fully intend to combine 
them.  Alternatively, there might be strong reasons to have both (and it just 
doesn't occur to me). In either of those two cases, "never mind"

However, despite these minor nits, I would end with saying that the working 
group has done good work on this draft; I look forward to the end product.

Thanks!
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to