On Sat, May 04, 2019 at 09:00:17AM -0400, Kathleen Moriarty wrote:
> On Fri, May 3, 2019 at 10:46 PM Peter Gutmann <pgut...@cs.auckland.ac.nz>
> wrote:
> 
> > Kathleen Moriarty <kathleen.moriarty.i...@gmail.com> writes:
> >
> > >MD5 is not discussed in the current version of RFC7525.
> >
> > I would add it, if this is guidance for general use then it should cover
> > all
> > the bases, if SHA-1 is a MUST NOT then MD5 is a REALLY REALLY REALLY MUST
> > NOT.
> >
> > (Technically SHA-1 is still safe for ephemeral signing, i.e. locations
> > where
> > an attacker can't spend arbitrary amounts of time working on precomputed
> > data,
> > which is most of TLS because of the nonces in the handshake and the fact
> > that
> > connections will quickly time out if nothing arrives, but since TLS 1.2 has
> > SHA-2 built in already there's probably little point in separating out
> > where
> > SHA-1 is safe vs. where it isn't).
> >
> 
> Sure, I agree, but needed to look through prior documents first.  Since it
> wasn't in RFC7525 as a recommendation and the minimum baseline was above
> MD5, I suspect that is why it is not mentioned.   If there is support (and
> no disagreements) the text above could be added and include SHA-1 and MD5
> MUST NOT be used.  The minimum baseline is already set above it though in
> the statement.
> 
> WG decision is appreciated on this point and proposed text for RFC 7525.
> 
> Proposed:
> 
>    When using RSA, servers SHOULD authenticate using certificates with
>    at least a 2048-bit modulus for the public key.  In addition, the use
>    of the SHA-256 hash algorithm is the minimum requirement, SHA-1 and
> MD5 MUST not be used (see [CAB-Baseline
> <https://tools.ietf.org/html/rfc7525#ref-CAB-Baseline>] for
>    more details).  Clients SHOULD indicate to servers that they request
>    SHA-256, by using the "Signature Algorithms" extension defined in
>    TLS 1.2.

We'd probably want to wordsmith it a bit more, as there's not exactly a
strict ordering on hash function strength, and "minimum requirement"
could be taken to mean "MUST use SHA-256", which is presumably not the
intent.

-Ben

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to