Re: [TLS] Deprecate SHA1 for signatures in TLS 1.3 (was Re: TLS 1.3 draft-07 sneak peek)

Eric Rescorla <ekr@rtfm.com> Tue, 07 July 2015 16:11 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 803491A9060 for <tls@ietfa.amsl.com>; Tue, 7 Jul 2015 09:11:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wg1u5VPrO2x8 for <tls@ietfa.amsl.com>; Tue, 7 Jul 2015 09:10:58 -0700 (PDT)
Received: from mail-wi0-f176.google.com (mail-wi0-f176.google.com [209.85.212.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A40E1A8F46 for <tls@ietf.org>; Tue, 7 Jul 2015 09:10:56 -0700 (PDT)
Received: by wiga1 with SMTP id a1so261365894wig.0 for <tls@ietf.org>; Tue, 07 Jul 2015 09:10:55 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=mrXg7u+9tdjAIzG+NpPUv4FyYLF/NeC9lXGSUxJ7S9s=; b=QDJVtjGTywSesxjnXgWmdcRHYewJjt254CGqvE7Ai7ITmBHLqDhWDEid0C8zQOPkIE AEZ5Ty5JFPsbDfj7SjS30runE4nEBT64jXVNNjQuAdIkl3zjlFJOcC4VeYkEb+RUHw6u 0yNUuj9rRCvFOs7fBiAToUK+4rLA8epMKLV2E6GpgH9nJcjsgf0D958PUj6wZkAZoO5u iKH9gvbHXH33UKDHommOIgq+/6QSG9zYM+KjcN3dGSiRJG74h1OitQ1DMX22hdjcQ9Jo lxfuQ4hU+MXz3bDOKs23h3SKO7yS03+/fG2T/uGK9AlbG4go6sLZEuVi21wF8M40aseq 6uhA==
X-Gm-Message-State: ALoCoQlHvmskIcUdv54Yq8LZndtt5Yp3ZBqttvthl5CB1RpEw5cy6sTklP3kI19hSNpSnkYcKjj2
X-Received: by 10.194.158.42 with SMTP id wr10mr9695728wjb.81.1436285455213; Tue, 07 Jul 2015 09:10:55 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.27.95.211 with HTTP; Tue, 7 Jul 2015 09:10:15 -0700 (PDT)
In-Reply-To: <201507071135.00448.davemgarrett@gmail.com>
References: <CABcZeBOWK_WnHAefsZUBr4UyEkyiZqi1mhoZH8ZeGFftdOqTTw@mail.gmail.com> <7D0FA086-F797-4B11-B5DE-6D202DEF8001@gmail.com> <20522301ad4047bf8a9e3794fd785da9@ustx2ex-dag1mb2.msg.corp.akamai.com> <201507071135.00448.davemgarrett@gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 07 Jul 2015 09:10:15 -0700
Message-ID: <CABcZeBMPsopxV=mu+MJAwJC6w=iuytA3ueyXKpg1QFdV=JWirw@mail.gmail.com>
To: Dave Garrett <davemgarrett@gmail.com>
Content-Type: multipart/alternative; boundary="089e013c64785abdb1051a4b443c"
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/0ub2iwsBldEuLDs2mMoGCm0TgmY>
Cc: Karthikeyan Bhargavan <karthik.bhargavan@gmail.com>, "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Deprecate SHA1 for signatures in TLS 1.3 (was Re: TLS 1.3 draft-07 sneak peek)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jul 2015 16:11:03 -0000

On Tue, Jul 7, 2015 at 8:35 AM, Dave Garrett <davemgarrett@gmail.com> wrote:

> On Tuesday, July 07, 2015 10:57:24 am Salz, Rich wrote:
> > > Putting aside the timeline for retiring SHA-1 from certificates, which
> will
> > > happen sooner than later, I think we should ban MD5 and SHA1 from
> client
> > > and server signatures in TLS 1.3.
> >
> > Strongly in favor.  I see no reason why a new protocol should ever use
> SHA1.
>
> Good. There seems to be strong support all around for this. I've updated
> the PR to drop SHA1 too.
>
> PR:
> https://github.com/tlswg/tls13-spec/pull/188/files
> Issue:
> https://github.com/tlswg/tls13-spec/issues/186


This PR seems to prohibit use of SHA-1 for certificates as well, which I'm
not sure
is wise. I suggest we put this on the agenda for Prague.

-Ekr


>
> I also have a mandatory extensions patch here:
>
> https://github.com/davegarrett/tls13-spec/compare/pruning...davegarrett:mandatoryextensions
>
> I'll probably just submit a PR for that too in a bit.
>
>
> Dave
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>