-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-03-01 11:35, Yoav Nir wrote:

>>> [HB] We have an RFC for PSS since 2003. We had several attacks 
>>> showing the weakness of PKCS #1 1.5.

And so (maybe not entirely coincidentally!): another attack, dubbed
DROWN, just emerged¹, using SSLv2 as - you guessed it - a
Bleichenbacher padding oracle against RSA PKCS#1 v1.5!

(Please do stop me if you've heard this one before! <g>)

>> [AJ] Why not ban PKCS #1.5 altogether from TLS 1.3? It will not 
>> only make TLS 1.3 more secure, but code simpler and footprint 
>> smaller. Besides, it's reasonable: TLS 1.2 already allows PSS in 
>> X.509

A very strong +1 as far as I'm concerned.

> [YN] It would be cool to ban PKCS#1.5 from certificates, but we
> are not the PKIX working group. Nor are we the CA/Browser forum.
> When a CA issues a certificate it has to work with every client
> and server out there, When we use TLS 1.3, the other side supports
> TLS 1.3 as well, so it’s fair to assume that it knows PSS.

Perhaps the PKIX working group and CAB/Forum could both use a friendly
reminder not to ignore how perilous using RSA PKCS#1 v1.5 still remains?
___
[1] <https://drownattack.com/drown-attack-paper.pdf>

- -- 
/akr
-----BEGIN PGP SIGNATURE-----
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=iX03
-----END PGP SIGNATURE-----

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to