> On May 22, 2017, at 3:42 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> Well, I certainly think past the Web PKI, because one of the cases I care 
> about
> is WebRTC, which doesn't do any PKI validation at all.
> 
> In any case, I think there are two issues:
> 1. Forbid TLS 1.3 implementations from accepting MD5 and SHA-1.
> 2. Require a specific failure if the peer presents such a certificate.
> 
> There was pretty strong consensus to do #1 and I don't support removing
> it.

The operative word here is *was*.  Time has passed, and things have changed:

        1.  The motivating problem (broad use of weak hashes in Web PKI
            certificates) has become a non-problem.  The CAs and the browsers
            have moved on.

        2.  We've since had many discussions that make it clearer still that
            layer violation into RFC5280 space is suboptimal.

        3.  While did not object strongly at the time, I've since seen that the
            language in question temps TLS stack authors to implement checks 
against
            the specific certificate algorithms at the TLS layer, instead of at 
the
            X509 verification layer where X509 security checks belong.

Surely there are some old GOST signature algorithms that could appear in 
certificates,
that TLS 1.3 does not prohibit, but which are not much stronger than SHA-1, and 
if not
GOST then something else.  Plucking out the specific code-points in question is 
both
insufficient and counter-productive.

It is time to revisit the previous consensus, because its motivation is no 
longer
relevant, and its negative consequences are more apparent.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to