On Mon, Oct 17, 2016 at 03:18:34PM -0400, Dave Garrett wrote:
> On Monday, October 17, 2016 02:10:30 pm Ilari Liusvaara wrote:
> > > %%% Authentication Messages
> > 
> > > If sent by a server, the signature algorithm MUST be one offered in the
> > > client's "signature_algorithms" extension unless no valid certificate 
> > > chain can be
> > > produced without unsupported algorithms (see {{signature-algorithms}}).
> > 
> > This is seemingly about server signatures. In that context, an
> > unknown algorithm has absolutely no chance of working.
> 
> This came up in a discussion a while back and we decided to allow
> unsupported algorithms as a last-ditch fall-back. Opportunistic
> encryption might not care and there are systems that may trust
> certs as a whole, not caring about the signatures. The end result
> is that the client should be tasked with making the decision to
> accept or reject, not the server. Also can be helpful for debugging.

The only possible way stuff like this is going to work is for the
client either ignores Certificate/CertificateVerify entierely (can't
trust the certificate via any method) or if the client has serious
security bug.

While e.g. trusting the server by SPKI does bypass any and all
signatures in certificates, it does not bypass this server signature.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to