Hi folks,

Bob Beck of OpenBSD/LibreSSL reported this issue with an implementation:
"
Fun fact: The TLS 1.2 signature algorithms extension is sent in client
preference order. http://outlook.office365.com  <https://t.co/EOcbx3oZpI>
then chooses the least preferred. every time.
Additional fun fact: I believe it is still standards compliant. RFC5246
says only that it must be sent by the client in preference order. It does
not say the server must respect the order.
"
My suggestion would be something like:
Section 7.4.1.4.1 <https://tools.ietf.org/html/rfc5246#section-7.4.1.4.1>.
current text:

Servers MUST NOT send this extension. TLS servers MUST support receiving
this extension.
Suggestion:
Servers MUST NOT send this extension. TLS servers MUST support receiving
this extension. TLS servers MUST respect the order in which the signature
algorithms are sent by the client.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to