Viktor Dukhovni wrote:
> 
> > On Mar 24, 2017, at 1:08 AM, Martin Thomson <martin.thom...@gmail.com> 
> > wrote:
> > 
> >> I've never seen
> >> a TLS server that has multiple chains to choose from for the same
> >> server identity.
>
  [ https://www.cloudflare.com/  ]
> 
> Both chains of course use SHA256.

Actually, looking at the DigiCert issued ECC cert for www.cloudflare.com
I'm a little confused.

This is the cert chain (as visualized by Microsoft CryptoAPI):

  server-cert:  CN=cloudflare.com, ...
                contains ECDSA P-256 public key
                is allegedly signed with sha256ECDSA

  intermediate CA:  CN=DigiCert ECC Extended Validation Server CA
                contains ECDSA P-384 public key
                is allegedly signed with sha384RSA

  root CA:      CN=DigiCert High Assurance EV Root CA
                contains RSA 2048-bit public key
                is self-signed with sha1WithRsaEncryption

For those who insist on reading rfc5246 verbatim, this chain requires

   ECDSA+SHA384:RSA+SHA384:RSA+SHA1


The digital signature on the server certificate looks bogus to me,
that should be a sha384ECDSA signature according to NIST, because
it uses a P-384 signing key.

The signature on the intermediate CA is imbalanced, and
should be sha256RSA rather than sha384RSA. (that is only an interop issue,
not a security issue).


-Martin

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to