On Friday 28 August 2015 20:17:11 Geoffrey Keating wrote:
> Jeffrey Walton <noloa...@gmail.com> writes:
> > > Also, if DSA was to be supported, one would need to specify how to
> > > determine the hash function (use of fixed SHA-1 doesn't fly). And
> > > 1024-bit prime is too small.
> > 
> > FIPS186-4
> > (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf)
> > partially remediates the issue. DSA now includes 2048 and 3072
> > sizes.

It still doesn't say exactly which hash should be used with which sizes.

and unlike RSA, the signature itself doesn't specify it either so hash 
truncation attacks are not impossible

> This is true, but if TLS 1.3 was to specify DSA, it should require the
> 2048 or 3072 sizes (since 1024 is last century's crypto), and
> existing implementations do not necessarily support those today.

those sizes are not really interoperable:
https://bugzilla.redhat.com/show_bug.cgi?id=1238369
because of the above (GnuTLS takes the conservative approach which is 
incompatible with NSS implementation)

> Which really highlights the question: who would actually use it?

Since 1024 bit is too weak and 2048 bit and 3072 bit is underspecified 
for TLS 1.2 it already isn't recommended for use (which means that the 
biggest deployment of DSA - US Gov - can't really use those bigger 
sizes, and in fact the Common Access Card already transitioned to RSA 
with the change to 2048 bit).

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to