>> > > Also, if DSA was to be supported, one would need to specify how to
>> > > determine the hash function (use of fixed SHA-1 doesn't fly). And
>> > > 1024-bit prime is too small.
>> >
>> > FIPS186-4
>> > (http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf)
>> > partially remediates the issue. DSA now includes 2048 and 3072
>> > sizes.
>
> It still doesn't say exactly which hash should be used with which sizes.

I believe you are supposed to provide equivalent security levels
across algorithms. If you are honoring NIST's recommendations, then
you can find them in SP 800-57 Part 1, Revision 3
(http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf);
and SP 800-131 A-Rev.1 (Draft)
(http://csrc.nist.gov/publications/drafts/800-131A/sp800-131a_r1_draft.pdf).

ECRYPT, NESSIE, and others provide similar recommendations. We can
probably add the IETF to the list :)

> and unlike RSA, the signature itself doesn't specify it either so hash
> truncation attacks are not impossible
>
>> This is true, but if TLS 1.3 was to specify DSA, it should require the
>> 2048 or 3072 sizes (since 1024 is last century's crypto), and
>> existing implementations do not necessarily support those today.
>
> those sizes are not really interoperable:
> https://bugzilla.redhat.com/show_bug.cgi?id=1238369
> because of the above (GnuTLS takes the conservative approach which is
> incompatible with NSS implementation)
>
>> Which really highlights the question: who would actually use it?
>
> Since 1024 bit is too weak and 2048 bit and 3072 bit is underspecified
> for TLS 1.2 it already isn't recommended for use (which means that the
> biggest deployment of DSA - US Gov - can't really use those bigger
> sizes, and in fact the Common Access Card already transitioned to RSA
> with the change to 2048 bit).

Regarding "who would actually use it": folks in US Federal (and those
doing business in US Federal) don't have the choices that others have.

Jeff

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to