Skip to content

Commit

Permalink
Merge pull request #3 from tomato42/sha1-ske
Browse files Browse the repository at this point in the history
clarify handling of SKE with MD5 or SHA1
  • Loading branch information
loganaden committed Jan 22, 2020
2 parents 51072fe + 998101b commit d520df9
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion draft-ietf-tls-md5-sha1-deprecate-00.xml
Expand Up @@ -170,8 +170,12 @@
<t>
Servers MUST NOT include MD5 and SHA-1 in ServerKeyExchange message.
If client does
receive a MD5 or SHA-1 signature in the ServerKeyExchange message it MUST
receive a MD5 or SHA-1 signature in the ServerKeyExchange message and it
sent one in signature_algorithms extensions it MUST
abort the connection with handshake_failure or insufficient_security alert.
If client did not send MD5 nor SHA-1 hash algorithm in signature_algorithms
extension and it receives a MD5 or SHA-1 signature in the ServerKeyExchange
it MUST abort the connection with the illegal_parameter alert.
</t>
</section>
<section anchor="CertificateVerify" title="Certificate Verify">
Expand Down

0 comments on commit d520df9

Please sign in to comment.