On Tue, Sep 12, 2017 at 8:42 AM, Dr Stephen Henson <
li...@drh-consultancy.co.uk> wrote:

> On 12/09/2017 15:10, Nikos Mavrogiannopoulos wrote:
> >
> > That is, because a TLS server would typically sign with whatever
> > algorithm the client supports and would very rarely be interested to
> > utilize the security advantages of including the parameters (which,
> > advantages, are quite unclear even to a crypto expert). Otherwise, a
> > certificate restricted to SHA-384 and 48-bytes of salt, will not be
> > able to serve a client which only supports RSASSA-PSS with SHA-256.
> >
> > As such, it would make sense for TLS 1.3 to recommend no parameters for
> > such RSASSA-PSS certificates, to ease their deployment.
> >
>
> Well restrictions in CA keys would be handled by the PKI verifier: if
> there is a
> violation the chain should be rejected and it's a problem with the chain
> itself
> and an error by the CA that issued it. A different case is where the
> restrictions are legal from a PKIX standpoint but not allowed by TLS 1.3,
> though
> again it's a CA error issuing such a chain for TLS 1.3 use.
>
> A restriction on the EE key isn't quite the same. There are two cases.
>
> One is that the parameters are not permitted by TLS 1.3 at all (e.g. MGF1
> digest
> doesn't match signing digest or minimum salt length exceeds digest
> length). In
> this case a server should never present the chain or if it does a client
> would
> justifiably reject it and abort the handshake. Again this is an error by
> the
> issuing authority which should be corrected.
>
> The second case is that the parameter restriction is permitted by TLS 1.3
> and
> this limits the digest which the key can sign with. Say the restriction is
> SHA384 and the client only supports rsa_pss_sha256. The server might then
> use to
> a different PSS key (and certificate chain) that supports rsa_pss_sha256
> or fall
> back to an RSA key to use rsa_pss_sha256. Again if a client sees a TLS
> message
> signed with parameters that violate the restrictions it could (with some
> justification) abort the handshake.
>
> This could get pretty messy: it requires a logic not used in any other
> algorithm. I'd be more than happy to have an outright prohibition on EE
> PSS key
> parameter restrictions in TLS 1.3 so implementers don't have to bother
> with this.


This sounds plausible to me. Would you be willing to send a PR?

-Ekr


>


> Steve.
> --
> Dr Stephen N. Henson.
> Founder member of the OpenSSL project: http://www.openssl.org/
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to