On Sat, Jan 16, 2016 at 11:01:12AM +0100, Hanno Böck wrote:
> 
> > - rsapss_sha256
> > - rsapss_sha384
> > - rsapss_sha512
> > - ecdsa_p256_sha256
> > - ecdsa_p256_sha384
> > - ecdsa_p256_sha512
> > - ecdsa_p384_sha256
> > - ecdsa_p384_sha384
> > - ecdsa_p384_sha512
> > - ecdsa_p521_sha256
> > - ecdsa_p521_sha384
> > - ecdsa_p521_sha512
> > - eddsa_ed25519
> > - eddsa_ed448
> 
> Do we really need that many?
> I think the "complexity zoo" of TLS is one of its current downsides and
> I really think we should go with fewer options in the future. Can we
> strip that down to - below 5 or something? (personal opinion: Strip
> down to 2, but this may be too radical for now.)

Well, there already are 3 main signature schemes...

Six of those on the list could be cut down (cutting the list to 8)
for purposes of server signature.

Unfortunately there might be more in certificate-to-certificate
signatures.

Also, I don't think having N signature algorithms is that bad (unless
your TLS stack architecture is garbage, but then you have other problems
anyway). But if that gets coupled to other things, you are in world of
hurt.

Such annoyances include the TLS_ECDHE_RSA_*/TLS_ECDHE_ECDSA_* cipher-
suites, since RSA_PSS presumably uses _RSA_ and others use _ECDSA_.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to