On 02/29/2016 09:32 AM, Joseph Salowey wrote:
We seem to have good consensus on moving to RSA-PSS and away from PKCS-1.5 in TLS 1.3. However, there is a problem that it may take some hardware implementations some time to move to RSA-PSS. After an off list discussion with a few folks here is a proposal for moving forward.

We make RSA-PSS mandatory to implement (MUST implement instead of MUST offer). Clients can advertise support for PKCS-1.5 for backwards compatibility in the transition period. Please respond on the list on whether you think this is a reasonable way forward or not.


I think that supporting PKCS1.5 fallback is the right thing to do for faster adoption of TLS 1.3, as specified above.

PKCS #1.5 is allowed by https://tools.ietf.org/html/draft-ietf-tls-tls13-11#section-6.3.2.1 in X.509 certificates. X.509 certificate chain is a part of TLS handshake. The above proposal is about not restricting one type of signature, the end-entity signature, to PSS. This applies to client authentication, server authentication, or both.

Without a generous advance warning about PKCS#1.5 removal by TLS 1.3, we have to deal with already deployed hardware. Had vendors and customers knew that TLS 1.3 will remove PKCS #1.5, we probably would have ended up with more PSS-friendly Internet. PKCS#1.5 is still fine for FIPS 140, Common Criteria, and in CA certificates in TLS 1.3.

The WG can chose to remove PSS from one type of signature in TLS1.3. The affected implementations will need to cap negotiation at TLS 1.2.

For more details: https://www.ietf.org/mail-archive/web/tls/current/msg19096.html
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to