On Wed, Mar 30, 2016 at 2:47 PM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> On Wed, Mar 30, 2016 at 01:33:57PM -0700, Eric Rescorla wrote:
> > On Wed, Mar 30, 2016 at 1:23 PM, Dave Garrett <davemgarr...@gmail.com>
> > wrote:
> >
> > > On Wednesday, March 30, 2016 11:22:15 am Eric Rescorla wrote:
> > > > 1. Add a "this is only usable for TLS 1.3 [or for subcerts]"
> extension to
> > > > PKIX.
> > >
> > > Adding a PKIX extension to mandate a minimum threshold of security
> > > configuration (e.g. PFS+AEAD w/o resumption or SHA1 or any support for
> TLS
> > > <1.2) would also be great to have
> >
> >
> > This seems like a fairly blunt instrument. Better to make sure that TLS's
> > negotiaton
> > mechanisms are reliable and trustworthy.
>
> Unfortunately, there's the broken key exchanges, which fundamentally
> compromise any version negotiation.
>
>
> Yes, one could set RSA KeyUsage to just DigitalSignature, which would
> nominally disable those broken key exchanges.


Why is this necessary in this case? If you're a server which won't do static
RSA, why isn't it enough to just refuse to negotiate those cipher suites?

-Ekr

Unfortunately:
>
> - Many clients don't enforce that.
> - That kind of certificates are listed as SHOULD NOT issue.
>
>
> -Ilari
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to