> On 2 Nov 2015, at 12:27 PM, Paul Wouters <p...@nohats.ca> wrote:
> 
> On Mon, 2 Nov 2015, Yoav Nir wrote:
> 
>>>> P.S. Someone’s asked me off-list whether there is any IPsecME document 
>>>> that says not to trust SHA-1 in signatures, both AUTH payload and 
>>>> certificates, the way the TLS 1.3 document may end up saying for TLS. I’m 
>>>> wondering if RFC4307bis might be the place for this, in particular the 
>>>> signature in AUTH payload. Just something to think about before we 
>>>> bikeshed.RFC4307bis Bikeshedding Session.
>>> 
>>> We should have text to clarify the difference of algorithm use in
>>> IKE/IPsec and in AUTH processing. Initial thought is that AUTH
>>> processing crypto restrictions don't beling in 4307bis.
>> 
>> I think we do need some kind of statement along the lines:
>> - With RSA signatures, use SHA-256 or better, not SHA-1 (BTW: 7296 says 
>> “SHOULD use SHA-1” and this is a document from only last year…)
>> - Don’t use DSS because that is only defined with SHA-1.
>> - With ECDSA no need to specify because each curve comes with a hash
>> - PSK is fine because you are using a PRF.
>> - With anything else, don’t use any hash weaker than SHA-256.
>> 
>> If not here, where does this advice go?
> 
> I see your point. But for instance for X509 certificates, I really would
> like to not make any statement and point to whatever equivalent of PKIX
> documents there are on that. Does the TLS WG have any documents on
> crypto agility for PKIX?

The TLS list currently has a thread about whether TLS 1.3 should prohibit SHA-1 
only in signatures or also in the certificate chain. 

It’s not decided yet, but they *are* prohibiting SHA-1 in the protocol 
(CertificateVerify message), and current spec prohibits server certificate 
signed with SHA-1 (only EE certificate) when another certificate exists.

Yoav

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to