On Sat, Oct 10, 2015 at 07:44:04PM +0200, Eric Rescorla wrote:
> On Sat, Oct 10, 2015 at 7:37 PM, Dave Garrett <davemgarr...@gmail.com>
> wrote:
> 
> > In light of completely unsurprising recent events [0], I think it's time
> > to reconsider the current consensus on how to deal with SHA-1 in TLS 1.3.
> > Currently, it's allowed if needed by servers that have nothing better [1].
> 
> To be clear, the only thing that's allowed is SHA-1 in *certificates*.
> It's forbidden in CertificateVerify.

Isn't using it in certificates precisely more dangeous than using it in
CertificateVerify (especially with TLS 1.3)?

(Not that using it in CertificateVerify is a good idea).


Also, AFAIK, TLS 1.3 won't be published this year, so by the time it is
published, one can't get SHA-1 certs from public CAs anyway (or if you
can, those don't work reliably anyway).


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to