On Oct 11, 2015, at 8:53 AM, Dave Garrett <davemgarr...@gmail.com> wrote:

> From a perspective to get it to work with the bare minimum needed, it's 
> excessive. From a perspective of killing SHA-1 wherever viable, it is not.

I don’t think killing SHA-1 wherever viable should be a goal of this document. 
A certificate is a credential. It can be used in multiple protocols, standard 
and proprietary. Whether the certificate is trusted or not is up to the relying 
party regardless of what protocols that relying party uses. It is not for the 
TLS spec to dictate what properties a certificate should have, except when 
those properties make a difference for the protocol. So if we’re removing DSA 
from the spec, and have not yet standardized EdDSA signatures, it makes sense 
to require that the public key (not the signature!) in the certificate be 
either RSA or ECDSA. I don’t think it’s reasonable to require stuff that 
doesn’t enter the protocol.

> Any continued legitimate allowance of a deprecated hash perpetuates other 
> possible continued allowances, even if the one in question is viable under 
> some specific circumstance.
> 
> The goal I'm aiming for is SHA-1 being restricted to TLS 1.2

And assuming that TLS 1.3 has better security than TLS 1.2, how does this goal 
help security on the Internet?

We are not in charge of the Internet. We are only engineering some protocols 
that we hope the implementers will find useful. The industry *is* moving away 
from signing certificates with SHA-1, but that decision is being made elsewhere.

Yoav


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to