Hello all,

it may be a naïve question, but is it still possible to define and standardize 
new cipher suites for TLS 1.2 as an RFC, when TLS 1.3 is almost finished?

The reason for asking is the discussion I started two weeks ago regarding 
integrity only cipher suites, which are not longer supported in TLS 1.3. While 
we most likely can cope with this by utilizing TLS 1.2 further as suggested, 
one question remains regarding the hash functions in the existing integrity 
only cipher suites. Currently, there is no integrity only cipher suite defined 
that combines ECDSA and SHA 256. There are only combinations with SHA1. 
Interestingly, there is one combining RSA and SHA 256.

To no longer depend on SHA1, we would like to standardize a combination of 
ECDSA and SHA 256 for instance TLS_ECDHE_ECDSA_WITH_NULL_SHA256. Would this 
still be possible, given the fact, that TLS 1.3 is likely to be finished in 
near time. I know that this depends on the acceptance of the WG, but I would 
like to ask first, if there is any intention to close TLS 1.2 for changes and 
additions, once TLS 1.3 is ready.

Best regards
Steffen

--
Steffen Fries
Siemens AG
Corporate Technology
CT RDA ITS
Otto-Hahn-Ring 6
81739 Muenchen, Germany
Tel.: +49 89 636-633604
Fax: +49 89 636-48000
mailto:steffen.fr...@siemens.com
www.siemens.com/ingenuityforlife<https://siemens.com/ingenuityforlife>

Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Gerhard Cromme; 
Managing Board: Joe Kaeser, Chairman, President and Chief Executive Officer; 
Roland Busch, Lisa Davis, Klaus Helmrich, Janina Kugel, Siegfried Russwurm, 
Ralf P. Thomas; Registered offices: Berlin and Munich, Germany; Commercial 
registries: Berlin Charlottenburg, HRB 12300, Munich, HRB 6684; WEEE-Reg.-No. 
DE 23691322

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to