It might pay to spend more time on explaining what you are trying to do.

The goal appears to be to remove a dependency on signature schemes that include 
these weaker hash functions.  But the introduction just says that the functions 
are bad.

You should be very clear about what effect this has on the use of SHA-1 in HMAC 
for record protection.  It looks like you don't intend to deprecate that.  Say 
that.

The change to the enum is silly.  Overall, I think that the updates to 5246 are 
unnecessary.  Concentrate on 7525.

The 7525 text starts with "When using RSA", so it could be read to not apply to 
ECDSA.  That would be a mistake.  I recommend splitting the paragraph into 
talking about the group size (the first sentence) and a separate paragraph on 
hash functions used as part of the signing process. 

As part of that, this probably needs to be a MUST: "Clients SHOULD indicate to 
servers that they request SHA-256, by using the "Signature Algorithms" 
extension defined in TLS 1.2."

And then I think we should publish something.  Like David, I'm acutely aware of 
the compatibility hazard that this presents, but it's no less worth doing.


On Fri, May 10, 2019, at 00:12, Loganaden Velvindron wrote:
> Hi all,
> 
> Following the recent thread on TLS 1.0 and TLS 1.1 deprecation, we
> came up with a proposal to deprecate md5 and sha1 for digital
> signatures in the TLS 1.2 spec.
> 
> Please find the draft at this url:
> https://tools.ietf.org/html/draft-lvelvindron-tls-md5-sha1-deprecate-03
> 
> We look forward to your feedback.
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to