On Thu, 14 Dec 2017 16:45:57 -0800
Colm MacCárthaigh <c...@allcosts.net> wrote:

> But what would that look like? What would we do now, in advance, to
> make it easy to turn off AES? For example.

I think this is the wrong way to look at it.

From what I'm aware nobody is really concerned about the security of
AES. I don't think that there's any need to prepare for turning off AES.

The problem with PKCS #1 v1.5 is that it survived so long *after* its
was known that it was bad. I really recommend everyone who wants to
know how protocols go bad to read up on the Bleichenbacher
countermeasures in TLS 1.0, 1.1 and 1.2 - and particularly the last
one. The chapter in 1.2 is a nightmare and I seriously fail to
understand how anyone could have seen that and think it's a good idea
to do that in order to stay compatible with a standard that was already
deprecated at that point.

We know that when this group decided to deprecate both PKCS #1 1.5 and
RSA encryption that there were people trying to lobby against that. I'm
glad that this wasn't successful.

I think the takeaway is just as simple as this: If you know an algorithm
is bad get rid of it and don't try to "rescue" it over into the next
protocol.

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: ha...@hboeck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to