I'm in favor of this change as well. It annoys Viktor, as it changes the 
fallback in a way that isn't ideal for some cases that trust the cert directly 
or with OE, but I think it's better than the alternative.


Dave


On Wednesday, October 21, 2015 03:17:44 pm Eric Rescorla wrote:
> I think this is the right answer and parallels what we are doing with PSS.
> 
> -Ekr
> 
> 
> On Wed, Oct 21, 2015 at 12:15 PM, Martin Thomson <martin.thom...@gmail.com>
> wrote:
> 
> > The current draft permits the use of SHA-1 in the certificate chain,
> > which gives SHA-1 a free pass indefinitely. Since we expressly forbid
> > the use of SHA-1 for signing in TLS itself, we can just permit clients
> > to include it in "signature_algorithms" and use that to determine
> > whether SHA-1 is acceptable.
> >
> > That means that clients that want to disable SHA-1 (real soon now, we
> > promise), can signal that preference cleanly.
> >
> > I've opened PR #317 for this, but the commit is probably more useful
> > to review, since I built this on top of ekr's client authentication
> > changes (to avoid messy rebases):
> >
> >
> > https://github.com/martinthomson/tls13-spec/commit/354475cf02819a9cc808457f2c09fdaeb1f82aa5

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to