Re: [TLS] Deprecate SHA1 for signatures in TLS 1.3 (was Re: TLS 1.3 draft-07 sneak peek)

Dave Garrett <davemgarrett@gmail.com> Mon, 13 July 2015 18:52 UTC

Return-Path: <davemgarrett@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A3811B2D2A for <tls@ietfa.amsl.com>; Mon, 13 Jul 2015 11:52:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qKXnczB_KVqQ for <tls@ietfa.amsl.com>; Mon, 13 Jul 2015 11:52:12 -0700 (PDT)
Received: from mail-qg0-x22a.google.com (mail-qg0-x22a.google.com [IPv6:2607:f8b0:400d:c04::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98F291B2D22 for <tls@ietf.org>; Mon, 13 Jul 2015 11:52:12 -0700 (PDT)
Received: by qgef3 with SMTP id f3so110927992qge.0 for <tls@ietf.org>; Mon, 13 Jul 2015 11:52:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:subject:date:user-agent:cc:references:in-reply-to :mime-version:content-type:content-transfer-encoding:message-id; bh=JSh+QxxfFu/Jul+aVCUgNdjr5pxEzgiDfZdOAc0nQQc=; b=Yj308yZ3PJSaT+bDxXtXyc6fwb4Zf8nDTfjZnC8jJo3IWZMotuSxeMtff6ulVcdhCp U/+Zt5hZjsS2C5vqeXDlXc3l9tEeDg9xpyYMRtrYZyZWQ7xiGcjB1mB6LMjO62dgaVig OCEhst9FpdEcjtXHmRO6yN4GwLe70pv312LMHPIwPIIMWce9Poe41hn5ifiX/WI6jiSt xAwKDizo74mcGeOPZ1vGnt2GqbnqZW5HJdaK8AMfE+j5MUzmsTcsqcXbtAckAW/7fCaQ 0bhQULLV17jknFhvbWpmQ7FMVUzd7NeO/9wghQrIzVMcjUA3KPe8WxTkLKIIHaT4EYRe 66ZA==
X-Received: by 10.140.148.137 with SMTP id 131mr57115767qhu.60.1436813531838; Mon, 13 Jul 2015 11:52:11 -0700 (PDT)
Received: from dave-laptop.localnet (pool-96-245-254-195.phlapa.fios.verizon.net. [96.245.254.195]) by smtp.gmail.com with ESMTPSA id f106sm11406880qgd.30.2015.07.13.11.52.11 (version=TLSv1 cipher=RC4-SHA bits=128/128); Mon, 13 Jul 2015 11:52:11 -0700 (PDT)
From: Dave Garrett <davemgarrett@gmail.com>
To: tls@ietf.org, Andrei Popov <Andrei.Popov@microsoft.com>
Date: Mon, 13 Jul 2015 14:52:09 -0400
User-Agent: KMail/1.13.5 (Linux/2.6.32-74-generic-pae; KDE/4.4.5; i686; ; )
References: <CALuAYvbteowTeyWe9VneRHgyvzTRS3LfKdorWt=jmEy2k+wNqw@mail.gmail.com> <20150713044104.GK28047@mournblade.imrryr.org> <BLUPR03MB1396DF5184A7E3DFAF3F11028C9C0@BLUPR03MB1396.namprd03.prod.outlook.com>
In-Reply-To: <BLUPR03MB1396DF5184A7E3DFAF3F11028C9C0@BLUPR03MB1396.namprd03.prod.outlook.com>
MIME-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <201507131452.10166.davemgarrett@gmail.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/tls/IdDrQNXOU56AutqkDblmv2npXo8>
Subject: Re: [TLS] Deprecate SHA1 for signatures in TLS 1.3 (was Re: TLS 1.3 draft-07 sneak peek)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2015 18:52:14 -0000

On Monday, July 13, 2015 01:11:29 pm Andrei Popov wrote:
> My preference would be to keep the client explicitly advertising its capabilities, and the server strictly honoring the client-advertised capabilities. And since the concept of "default algorithms" confuses people, let's just get rid of it in 1.3. Conveniently, most of this WG no longer wants SHA1 or MD5. Why not just make signature_algorithms (even more) clearly and unambiguously MTI in 1.3?

Yep. I already have that in a WIP branch at the moment. I'm merging together all my WIPs from WG discussion on the topics of alerts and certs here:

https://github.com/davegarrett/tls13-spec/compare/seanfixesredux...davegarrett:alertsandcerts

There's a backlog of PRs on main, so diffing on top of Sean Turner's fixes branch to reduce noise in the diff.


Dave