On 03/29/2017 10:29 AM, Subodh Iyengar wrote:
>
>
>
> > Do we want to leave the valid SignatureSchemes as all that are
> defined, or mention the Recommended column in the registry, or narrow
> things even further?  In other words, should we give some guidance for
> how to select a scheme to use?
>
> It's restricted to the ones that are supported by the client in TLS
> 1.3. I don't see TLS recommending signature algorithms to use beyond
> section 4.2.3 that "rsa_pkcs1_sha1, dsa_sha1, and ecdsa_sha1 SHOULD
> NOT be offered.". What kind of a recommendation would you like to see.
> Would love a pull request at https://github.com/ekr/tls-subcerts/pulls
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_ekr_tls-2Dsubcerts_pulls&d=DwMFAw&c=96ZbZZcaMF4w0F4jpN6LZg&r=sssDLkeEEBWNIXmTsdpw8TZ3tAJx-Job4p1unc7rOhM&m=MX_8eP9NvbNaOiSC3ukAcNUD_L0Q6aEVZRPgnjTFQDg&s=ov37thVJjJShsq7fMsmzBtxCvl51V6TYvHzAwfC7MvI&e=>
>  to
> get a general idea of what you would like to see.
>
>

All I had in mind was like one sentence when talking about the
interpretation of the 'scheme' field of DelegatedCredential: "The scheme
is taken from the TLS SignatureSchemes registry [RFCTLS1.3], and schemes
recommended for use in TLS are also recommended for use in delegated
credentials."  Arguably not needed at all, but perhaps gives a bit more
clarity.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to