On Fri, Sep 2, 2016 at 12:21 PM, Hubert Kario <hka...@redhat.com> wrote:

> On Friday, 2 September 2016 21:38:33 CEST Yoav Nir wrote:
> > > On 2 Sep 2016, at 8:27 PM, Hubert Kario <hka...@redhat.com> wrote:
> > >
> > > On Friday, 2 September 2016 12:06:55 CEST Benjamin Kaduk wrote:
> > >> On 09/02/2016 12:04 PM, Eric Rescorla wrote:
> > >>> On Fri, Sep 2, 2016 at 8:25 AM, Dave Garrett <davemgarr...@gmail.com
> > >>>
> > >>> <mailto:davemgarr...@gmail.com>> wrote:
> > >>>    On Friday, September 02, 2016 07:32:06 am Eric Rescorla wrote:
> > >>>> On Fri, Sep 2, 2016 at 3:42 AM, Ilari Liusvaara
> > >>>>
> > >>>    <ilariliusva...@welho.com <mailto:ilariliusva...@welho.com>>
> wrote:
> > >>>>> I also don't see why this should be in TLS 1.3 spec, instead of
> > >>>>> being
> > >>>>> its own spec (I looked up how much process BS it would be to
> > >>>>>
> > >>>    get the
> > >>>>>
> > >>>>> needed registrations: informative RFC would do).
> > >>>>
> > >>>> I also am not following why we need to do this now. The reason
> > >>>>
> > >>>    we defined SHA-2 in
> > >>>>
> > >>>> a new RFC was because (a) SHA-1 was looking weak and (b) we had
> > >>>>
> > >>>    to make significant
> > >>>>
> > >>>> changes to TLS to allow the use of SHA-2. This does not seem to
> > >>>>
> > >>>    be that case.
> > >>>
> > >>>    I don't think we strictly _need_ to do this now, however I think
> > >>>    it's a good idea given that we'll need to do it eventually
> > >>>
> > >>> I'm not sure that that's true.
> > >>
> > >> Predicting future needs is not always reliable, yes.
> > >>
> > >>> From a release-engineering (standards-engineering?) perspective, I
> still
> > >>
> > >> don't see any reasons to add it now, and do see reasons to not add it
> > >> now.
> > >
> > > what would be the reasons not to add it now?
> >
> > Several reasons:
> >  - This is a core spec. Those don’t traditionally specify new algorithms
> > unless they’re MTI (like SHA-256 is TLS 1.2 and RSAPSS here)
> > - For now,
> > SHA-3 is yet another national algorithm. Why add this and not Streebog?
> [1]
> > - Who’s to tell whether SHA-2 breaks earlier than SHA-3?
>
> But then we have:
> * AES and ChaCha (two modes for the former one even)
> * RSA and ECDSA
> * NIST curves and Bernstein curves
> * ECDHE key exchange an DHE key exchange
>
> only the SHA-2 stands alone...
>

We have SHA-256 and SHA-384.

-Ekr


>
> --
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to