Hi, At the moment there is still ambiguity in the requirements for PSS with relation to certificates. Proposal to clarify this: https://github.com/tlswg/tls13-spec/pull/1098
This PR intends to clarify the requirements for PSS support. The requirements are intentionally minimal to reduce implementation efforts, but recognizes that some other implementations may be more complete. Notes: - "Supporting PSS signatures on certificates is a mandatory requirement and I think we should be very clear about the parameters we permit." https://www.ietf.org/mail-archive/web/tls/current/msg23007.html - Martin Rex wishes to remove TLS requirements on signature algorithms for certificates, hence the "MAY" for other PSS parameters in this PR. https://www.ietf.org/mail-archive/web/tls/current/msg23021.html - Regardless, rsa_pss_sha256 is currently MTI for CertificateVerify and certificates, hence the strong MUST wording in this PR. - It does not say anything about non-end-entity certificates, that's up to the PKI verifier. Consider case "CA Key: rsa-pss; EE signature: rsa-pss; EE key: rsa" from https://www.ietf.org/mail-archive/web/tls/current/msg24453.html - PSS params in certificates are explicitly not restricted, satisfying https://www.ietf.org/mail-archive/web/tls/current/msg24457.html >From what I have heard, boringssl does not (or will not?) implement any PSS support in the certificates (yet?). Don't know if anything should be changed here to reflect that decision, but I thought it is worth mentioning. It is possible that I'll follow boringssl's example in tris. If a TLS extension is introduced later, hopefully that improves interop with odd keys and signatures that are optional in this PR (PSS pubkey or custom salt lengths). -- Kind regards, Peter Wu https://lekensteyn.nl _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls