In summary: 
+1 to Viktor’s argument.
-1 to Dave’s.
--
Regards,
Uri Blumenthal




On 10/11/15, 22:41, "TLS on behalf of Dave Garrett" <tls-boun...@ietf.org
on behalf of davemgarr...@gmail.com> wrote:

>On Sunday, October 11, 2015 08:00:45 pm Viktor Dukhovni wrote:
>> There's no reason for pessimism
>
>Sorry, I have to laugh a bit here. :p
>
>> we're not trying to deprecated deployed
>> functionality, there is no TLS 1.3 deployed base.
>
>Due to the fact that the vast majority of TLS implementations that will
>be used are going to be existing ones, upgraded to support TLS 1.3, yes
>we are deprecating deployed functionality for that implementation as well
>as their users.
>
>> > Prohibiting TLS 1.3 implementations from using SHA1 certs does not
>>break
>> > OE.  
>> 
>> It does when the SHA-1 leaf certificate is pinned, and/or the server
>> has nothing else to send, and its clients rightly don't care.
>
>In the second case, a correct course of action for the server would be to
>send an incomplete or outright empty certificate_list fallback, in which
>case the clients that don't care will be fine with it. Pinning a SHA1
>end-entiy (leaf) cert rather than an intermediate just seems like a bad
>idea that you can't expect to work forever. In cases where the server
>can't handle lack of SHA1, then my response is to fix that before
>upgrading TLS.
>
>> > My goal is to have fewer systems using SHA1 within a reasonable
>>timeframe.
>> 
>> That happens automatically in the minimal version of the PR.
>
>We're both trying to predict possible futures with different thought
>processes. I'm concerned that the simpler course is too slow, _not_
>because we need to rush to get rid of SHA1 certs ASAP, but because going
>slower requires keeping SHA-1 around in implementations in the interim.
>Even requiring settings and code for an algorithm at all poses an attack
>surface by itself (we had attacks on supposedly disabled features over
>the past year). Every known vulnerable feature is one which we have to be
>wary of getting re-enabled or left on accidentally. I consider this risk
>to be high enough to not rely on delegation to another layer; you think
>that delegation cannot be changed without excessive interop risk.
>
>I'll post a follow-up question to the WG (with a changed title, as our
>discussion here got long) with the options phrased as a question with 3
>main choices (including the option of doing nothing new). If there's no
>support for a full drop in SHA-1 support under the new version, then
>there won't be a point in pushing for it further, unless there's yet
>another SHA-1 revelation in the near future.
>
>
>Dave
>
>_______________________________________________
>TLS mailing list
>TLS@ietf.org
>https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to