> On May 22, 2017, at 3:42 PM, Eric Rescorla <e...@rtfm.com> wrote: > > Well, I certainly think past the Web PKI, because one of the cases I care > about > is WebRTC, which doesn't do any PKI validation at all. > > In any case, I think there are two issues: > 1. Forbid TLS 1.3 implementations from accepting MD5 and SHA-1. > 2. Require a specific failure if the peer presents such a certificate. > > There was pretty strong consensus to do #1 and I don't support removing > it.
The operative word here is *was*. Time has passed, and things have changed: 1. The motivating problem (broad use of weak hashes in Web PKI certificates) has become a non-problem. The CAs and the browsers have moved on. 2. We've since had many discussions that make it clearer still that layer violation into RFC5280 space is suboptimal. 3. While did not object strongly at the time, I've since seen that the language in question temps TLS stack authors to implement checks against the specific certificate algorithms at the TLS layer, instead of at the X509 verification layer where X509 security checks belong. Surely there are some old GOST signature algorithms that could appear in certificates, that TLS 1.3 does not prohibit, but which are not much stronger than SHA-1, and if not GOST then something else. Plucking out the specific code-points in question is both insufficient and counter-productive. It is time to revisit the previous consensus, because its motivation is no longer relevant, and its negative consequences are more apparent. -- Viktor. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls