On Tue, Jan 12, 2016 at 9:17 AM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:
>
> > - Drop 99% of all cipher suites, leaving one traditional one (DHE +
> AES-CBC +
> >   HMAC-SHA2 + RSA-SHA2/PSK for auth) and one ECC one (ECDHE + AES-GCM +
> HMAC-
> >   SHA2 + ECDSA-SHA2/PSK for auth) as must's (with a strong preference
> for OCB
> >   instead of GCM as the AEAD if it were freely available).
>
> DHE has serious problems. While the present TLS 1.3 way of doing DHE
> isn't totally horrible, advertise DHE and you can get downnegotiation to
> TLS 1.2 DHE, and now you are screwed.
>

Nit: this shouldn't be possible with the anti-downgrade mechanism that was
introduced
in draft-11 because the server's signature will cover the random value. If
you area
aware of an issue here, I would appreciate more information.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to