> On May 22, 2017, at 11:35 AM, Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:
> 
> Still, all of this belongs in an update of RFC5280, but if we just can't
> resist saying something here along the lines you suggest then it might be:
> 
> "When peer authentication is via a certificate, with RFC5280 (PKIX) chain
> verification, certificate signature algorithms weaker than <list of weakest
> acceptable signature algs here> MUST NOT be trusted."

I want to reiterate, that the simplest approach, and the one that I
would prefer, is not to repurpose the TLS 1.3 specification to carry
language that properly belongs in PKIX.  The "MUST NOT" language
related to MD5 and SHA-1 in *certificate signatures* should be removed.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to