It does feel like an artifact of the times, yes.
So I am not sure if there is a better option than "Rejected" (or, I guess,
leave in "Reported" indefinitely).

-Ben

On Fri, Oct 19, 2018 at 05:34:48PM +1100, Martin Thomson wrote:
> An artifact of the times more than an error methinks?  The document
> does also say: "Currently, DSA [DSS] may only be used with SHA-1." in
> the context of talking about use of different hash algorithms for DSA.
> 
> Good thing that we obsoleted that RFC and removed DSA, now we don't
> have to worry about it any more... ;)  Seriously though, I don't know
> the process for dealing with valid criticisms of features that have
> been obsoleted.  Hold For Document Update seems very wrong, so we can
> rule that out at least.
> 
> On Fri, Oct 19, 2018 at 5:25 PM RFC Errata System
> <rfc-edi...@rfc-editor.org> wrote:
> >
> > The following errata report has been submitted for RFC5246,
> > "The Transport Layer Security (TLS) Protocol Version 1.2".
> >
> > --------------------------------------
> > You may review the report below and at:
> > http://www.rfc-editor.org/errata/eid5535
> >
> > --------------------------------------
> > Type: Technical
> > Reported by: Dave Thompson <dave_thompso...@comcast.net>
> >
> > Section: 4.7
> >
> > Original Text
> > -------------
> >    In DSA, the 20 bytes of the SHA-1 hash are run directly through the
> >    Digital Signing Algorithm with no additional hashing. ...
> >
> > Corrected Text
> > --------------
> >    In DSA, the bytes of the selected hash are run directly through the
> >    Digital Signing Algorithm with no additional hashing. ...
> >
> > Notes
> > -----
> > In 2246 and 4346 this statement (then using the less-accurate spellings DSS 
> > and SHA) was correct because only SHA1 was used for DSA (and ECDSA, in 
> > 4492, versus SHA1+MD5 for RSA), but 5246 changed this to allow specifying 
> > one of several hashes, with selection constrained by the 
> > signature_algorithms extension (if present) or CertificateRequest field 
> > from the peer.
> >
> > FIPS 186 actually defines the hashing step as part of signature generation 
> > and verification, so it might be even better to make this something like 
> > "For DSA, signature generation applies the selected hash [to the contents] 
> > and then computes two values, r and s." similar to the way the preceding 
> > paragraph of 5246 "In RSA signing" differs from the 2246 and 4346 versions 
> > by no longer treating the hashing as separate, but that is a bigger change 
> > to an obsoleted document, and arguably problematic because the normative 
> > reference is FIPS 186-2; as indicated in Appendix B on page 80, 186-3 which 
> > officially allowed DSA to use FIPS 180-3 hashes (not only SHA-1) was 
> > released in draft before 5246 but not finalized until after (2006-03 to 
> > 2009-06 versus 2008-08).
> >
> > Instructions:
> > -------------
> > This erratum is currently posted as "Reported". If necessary, please
> > use "Reply All" to discuss whether it should be verified or
> > rejected. When a decision is reached, the verifying party
> > can log in to change the status and edit the report, if necessary.
> >
> > --------------------------------------
> > RFC5246 (draft-ietf-tls-rfc4346-bis-10)
> > --------------------------------------
> > Title               : The Transport Layer Security (TLS) Protocol Version 
> > 1.2
> > Publication Date    : August 2008
> > Author(s)           : T. Dierks, E. Rescorla
> > Category            : PROPOSED STANDARD
> > Source              : Transport Layer Security
> > Area                : Security
> > Stream              : IETF
> > Verifying Party     : IESG
> >
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to