On Thursday, August 27, 2015 02:48:15 pm Martin Thomson wrote:
> I've been looking at the latest TLS 1.3 spec and there are a lot of
> MUSTs that are completely toothless.  To pick on a recent changeset:
> 
> > The signature algorithm and hash algorithm MUST be a pair offered in the
> "signature_algorithms" extension (see {{signature-algorithms}}).

Some changes to this are now in this PR:
https://github.com/tlswg/tls13-spec/pull/231/files
(language based on list discussion)

> > All implementations MUST use the "signature_algorithms" extension when
> offering and negotiating certificate authenticated cipher suites.

Actually, I did get a strict requirement in there for that one:

https://github.com/tlswg/tls13-spec/blob/master/draft-ietf-tls-tls13.md#signature-algorithms
> All clients MUST send a valid "signature_algorithms" extension in their 
> ClientHello when offering certificate authenticated cipher suites. Servers 
> receiving a TLS 1.3 ClientHello offering certificate authenticated cipher 
> suites without this extension MUST send a "missing_extension" alert message 
> and close the connection.

I think it warrants repeating in the MTI section as well.

> > All implementations MUST use the "supported_groups" extension when
> offering and negotiating DHE or ECDHE cipher suites.

My initial draft had similar language, however ekr says the WG doesn't have 
consensus to be more strict. I would like to consider all of these extensions 
as mandatory to send, and malformed if not present when offering/negotiating 
any applicable cipher suites:
signature_algorithms, supported_groups, client_key_share, pre_shared_key, 
server_name (though, I'm fine with a SHOULD error on lack of SNI when 
applicable)


Dave

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to