On Sat, Oct 10, 2015 at 05:11:56PM -0400, Dave Garrett wrote:

> Note that opportunistic encryption is weird and getting
> the whole document to be perfect for it might not be entirely doable, as
> OE needs to tolerate more fuzziness than the main spec should allow.

Unfortunately requirements in the base TLS document end up "set in
stone" in software implementations, and then break opportunistic
TLS in ways application software can't work around.

So while the UTA TLS BCP can write requirements that exclude
opportunistic security, the TLS specification does not have
that liberty.

In this case the solution is simple enough.  DO NOT prohibit
the exchange of certificate chains with SHA-1 in them.  Just
prohibit *trusting* their content.

We alredy have language to allow servers and client to send
"last-resort" chains that don't match the peer's advertised supported
algorithms.  This suffices.

The necessary changes are then MUCH simpler than the current pull
request 287.

    * Prohibit advertising SHA-1 in the supported algorithms list,
      (except as needed for TLS 1.2 compat, ...)

    * Prohibit trusting SHA-1 when found in certificates that are
      not self-signed.

That's it.  A lot less work.  SHA-1 is no longer trusted, but does
not impede interoperability when certificates are largely useless
baggage.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to