On Thu, Mar 23, 2017 at 10:23 PM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
> > On Mar 24, 2017, at 1:08 AM, Martin Thomson <martin.thom...@gmail.com>
> wrote:
> >
> >> I've never seen
> >> a TLS server that has multiple chains to choose from for the same
> >> server identity.
>
> Both chains of course use SHA256.
>

I am too lazy to check if it's still true but at least for a while
https://www.mozilla.org/
had both a SHA-1 and a SHA-256 certificate so that we could serve Firefox to
people on very downrev browsers (e.g., XP).

-Ekr


> Sorry I meant to say multiple digest algorithms for otherwise
> identical chains (same public key algorithm and server name).
>
> Even in the SMTP space some servers have both RSA and ECDSA certs.
> When that's the case, cipher negotiation ensures that the selected
> EE certificate's public key algorithm is mutually supported.
>
> There's still little need to pay attention to the client's signature
> algorithms in choosing the EE-certificate and associated chain.
>
> --
> --
>         Viktor.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to