On Tuesday, 14 May 2019 20:16:17 CEST Loganaden Velvindron wrote:
> On Tue, May 14, 2019 at 3:24 PM Hubert Kario <hka...@redhat.com> wrote:
> > On Tuesday, 14 May 2019 08:34:38 CEST Loganaden Velvindron wrote:
> > > Latest draft is here:
> > > https://www.ietf.org/id/draft-lvelvindron-tls-md5-sha1-deprecate-04.txt
> > 
> > why did you drop SHA-1 from Section 4 and 5?
> 
> It was done following this comment from David Cooper.
> 
> "
> [..] While they may be subject to collision attacks, SHA-1 is still
> considered secure in cases in which collision resistance is not required,
> and I do not believe that collision resistance is required when SHA-1 is
> used to create the "signatures" in the ServerKeyExchange and
> CertificateVerify messages.
> "

SLOTH paper disagrees on that as far as CertificateVerify message is concerned

SP 800-52 rev-2 does not provide much in terms of justification why SLOTH 
paper would be wrong and allows for SHA-1 signatures only in TLS 1.0 and TLS 
1.1, it does not explicitly state that SHA-1 signatures in TLS 1.2 are 
allowed...
-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to