On Thu, Mar 23, 2017 at 9:44 AM, Martin Rex <m...@sap.com> wrote:

> Fries, Steffen wrote:
> >
> > based on your reply my conclusion is that
> >
> > -  there is no (standard compliant) way for a server to use a SHA256
> > based certificate for server side authentication in cases where the
> > client does not provide the signature_algorithm extension
>
> The statement quoted by Eric is an obvious and silly defect in the spec,
> which the entire installed base of TLSv1.0 and TLSv1.1 completely ignored
> --even Microsoft's implementation of TLSv1.0 and TLSv1.1 properly ignores
> it.
>

I don't think this statement is entirely accurate about what the
requirements are.

- TLS 1.0 and 1.1 did not offer any way for the client to tell the server
what algorithms
  it supported. For this reason, if you receive a TLS 1.0 or 1.1
ClientHello, all you
  can do is send whatever certificate you have. So, TLS 1.0 and 1.1
implementations
  are not ignoring any requirement by doing so, rather they are following
the
  specification.

- TLS 1.2 implementations which receive TLS 1.2 ClientHellos which either
  do not have signature_algorithms or which have signature_algorithms
without
  SHA-256 are not supposed to send SHA-256 certificates (per the text I
quoted
  above). Again, I realize opinions differ on the wisdom of this text. The
extent to
  which it is an interop problem depends on how many clients would support
  SHA-256 but for some reason offer 1.2 w/o the required extension. I would
be
  grateful for any data on the frequency of such clients.

- As has been noted elsewhere, TLS 1.3 relaxes the requirement to not send
  certificates which do not match signature_algorithms.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to