Adam Langley <a...@imperialviolet.org> wrote:

> On Fri, Dec 18, 2015 at 1:43 PM, Brian Smith <br...@briansmith.org> wrote:
> > That is, it seems it would be better to use HKDF-SHA512 instead of
> > **HKDF-SHA256**.
>
> I assume that you mean for TLS 1.3 since you mention HKDF?

No, I mean for all versions of TLS.


> I updated
> the draft recently because David Benjamin noted that the names didn't
> include the PRF (which they should these days) and that OpenSSL, at
> least, used SHA-256, so might as well make the spec match reality.
>

The version of OpenSSL that implements these cipher suites is not released
yet. They updated that  implementation just 9 days ago, so it seems pretty
malleable still.


> So, the current code points are probably SHA-256 now. I don't object
> to adding more if people want SHA-384 too. Although, since the hash
> function is only used in key derivation with these cipher suites,


I don't think it would be a good idea to add more code points to negotiate
SHA-512 in the PRF while still leaving code points for negotiating SHA-256
in the PRF. It should be one or the other.


> I'm
> not sure that a slower, software implementation of SHA-256 would be a
> big problem.


It just seems really unfortunate to mandate SHA-512 for Ed25519 and then
mandate SHA-256 for ChaCha20-Poly1305 in TLS. Mandating the same algorithm
for both seems like a better idea.

Cheers,
Brian
-- 
https://briansmith.org/
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to