On Fri, Sep 2, 2016 at 3:42 AM, Ilari Liusvaara <ilariliusva...@welho.com>
wrote:

> On Fri, Sep 02, 2016 at 12:08:47PM +0200, Hubert Kario wrote:
> > On Thursday, 1 September 2016 19:22:18 CEST Dave Garrett wrote:
> > >
> > > The reason I see is that we currently specify exactly one valid hash
> > > algorithm (in a variety of sizes). The precedent argument is good
> enough
> > > for me. I think adding it in this document is definitely worth
> considering.
> > > I don't want to wait until SHA-2 is considered weak to provide an
> > > alternative, if we can avoid it.
> >
> > I've created a PR for it: https://github.com/tlswg/tls13-spec/pull/616
> >
> > I haven't changed any recommendations, the recommended hashes to
> implement are
> > still SHA-2 based, and I don't think we should change that given that
> > certificates just now are transitioning to SHA-256 because of
> incompatibility
> > fears.
>
> Just tweaking the signatures is not enough. There is also the PRF hash,
> and using weak hash there has, umm... rather bad consequences.
>
> I also don't see why this should be in TLS 1.3 spec, instead of being
> its own spec (I looked up how much process BS it would be to get the
> needed registrations: informative RFC would do).
>

I also am not following why we need to do this now. The reason we defined
SHA-2 in
a new RFC was because (a) SHA-1 was looking weak and (b) we had to make
significant
changes to TLS to allow the use of SHA-2. This does not seem to be that
case.

-Ekr


>
> -Ilari
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to