I’m not even sure what my position is on this. Specifying the use of a
context here goes against the recommendation in the CFRG draft:

      Contexts SHOULD NOT be used opportunistically, as that kind of use
      is very error-prone.  If contexts are used, one SHOULD require all
      signature schemes available for use in that purpose support
      contexts.

If someone knows why this recommendation was made, that would be great.

Basically, then those other methods would be a weak point for attack.


But we are trying to migrate away from the old methods, into the new methods. The fewer servers use the old methods, the better off we are, right? So we expect the attack surface to gradually be reduced over the coming years.



Then there's the serious deployment problems with contexts, as those
don't fit into any standard notion of signature various libraries have.


These are new algorithms that are still not widely deployed. The fact that several open source libraries (still) don't support a certain function parameter is not a very strong reason not to require it.

Thanks,
        Yaron

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to