This document has WGLC and so has a presumption of consensus. If you want
to re-raise that, this is a process question which is the province of the
chairs, so if you feel strongly, as it appears you do, I would encourage
you raise it with them.

-Ekr


On Tue, May 23, 2017 at 6:02 AM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
> > On May 22, 2017, at 3:42 PM, Eric Rescorla <e...@rtfm.com> wrote:
> >
> > Well, I certainly think past the Web PKI, because one of the cases I
> care about
> > is WebRTC, which doesn't do any PKI validation at all.
> >
> > In any case, I think there are two issues:
> > 1. Forbid TLS 1.3 implementations from accepting MD5 and SHA-1.
> > 2. Require a specific failure if the peer presents such a certificate.
> >
> > There was pretty strong consensus to do #1 and I don't support removing
> > it.
>
> The operative word here is *was*.  Time has passed, and things have
> changed:
>
>         1.  The motivating problem (broad use of weak hashes in Web PKI
>             certificates) has become a non-problem.  The CAs and the
> browsers
>             have moved on.
>
>         2.  We've since had many discussions that make it clearer still
> that
>             layer violation into RFC5280 space is suboptimal.
>
>         3.  While did not object strongly at the time, I've since seen
> that the
>             language in question temps TLS stack authors to implement
> checks against
>             the specific certificate algorithms at the TLS layer, instead
> of at the
>             X509 verification layer where X509 security checks belong.
>
> Surely there are some old GOST signature algorithms that could appear in
> certificates,
> that TLS 1.3 does not prohibit, but which are not much stronger than
> SHA-1, and if not
> GOST then something else.  Plucking out the specific code-points in
> question is both
> insufficient and counter-productive.
>
> It is time to revisit the previous consensus, because its motivation is no
> longer
> relevant, and its negative consequences are more apparent.
>
> --
>         Viktor.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to