On Friday, 3 September 2021 18:00:12 CEST, internet-dra...@ietf.org wrote:
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Transport Layer Security WG of the IETF.

Title : Deprecating MD5 and SHA-1 signature hashes in (D)TLS 1.2
        Authors         : Loganaden Velvindron
                          Kathleen Moriarty
                          Alessandro Ghedini
        Filename        : draft-ietf-tls-md5-sha1-deprecate-08.txt
        Pages           : 6
        Date            : 2021-09-03

Abstract:
   The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to
   attack and this document deprecates their use in TLS 1.2 digital
   signatures.  However, this document does not deprecate SHA-1 in HMAC
   for record protection.  This document updates RFC 5246.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-tls-md5-sha1-deprecate/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-tls-md5-sha1-deprecate-08

  Servers SHOULD NOT include MD5 and SHA-1 in CertificateRequest
  messages.

   Clients MUST NOT include MD5 and SHA-1 in CertificateVerify messages.
  If a server receives a CertificateVerify message with MD5 or SHA-1 it
  MUST abort the connection with handshake_failure or
  insufficient_security alert.

As written, this would make already existing implementations not RFC compliant
when they are configured to not support SHA-1.

RFC5246 requires the server to abort with illegal_parameter if the
CV included an algorithm that wasn't advertised in CR.
--
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to