On Friday, 2 September 2016 13:42:40 CEST Ilari Liusvaara wrote:
> On Fri, Sep 02, 2016 at 12:08:47PM +0200, Hubert Kario wrote:
> > On Thursday, 1 September 2016 19:22:18 CEST Dave Garrett wrote:
> > > The reason I see is that we currently specify exactly one valid hash
> > > algorithm (in a variety of sizes). The precedent argument is good enough
> > > for me. I think adding it in this document is definitely worth
> > > considering.
> > > I don't want to wait until SHA-2 is considered weak to provide an
> > > alternative, if we can avoid it.
> > 
> > I've created a PR for it: https://github.com/tlswg/tls13-spec/pull/616
> > 
> > I haven't changed any recommendations, the recommended hashes to implement
> > are still SHA-2 based, and I don't think we should change that given that
> > certificates just now are transitioning to SHA-256 because of
> > incompatibility fears.
> 
> Just tweaking the signatures is not enough. There is also the PRF hash,
> and using weak hash there has, umm... rather bad consequences.

SHA-3 ciphersuites added

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to