> On May 22, 2017, at 5:22 PM, Eric Rescorla <e...@rtfm.com> wrote:
> 
> I don't think "opportunistic" is a clearly enough defined category to be 
> useful
> here.

If you mean:

> I don't think "strongly authenticate" is useful here. I think the
> requirement is that the RP must not accept these algorithms in any
> context which would require validating signatures made using them.

That's fine.

> Rather, I think the relevant criterion is the one I listed above. If people
> agree, I'd be happy to make that change (and can produce text) because I
> think it conforms to the WG consensus.

The above formulation (where the relying party does not accept certain
signature algorithms as valid in the context of validating issuer
signatures) works for me.  All I'm looking for is not requiring the
RP to abort the handshake as soon as the algorithm is encountered,
even when the signature would never be checked!

So if putting the consensus to ban MD5/SHA-1 in its *proper context*
is consistent with the WG consensus, let's do that.

-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to