Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Strict handling of hash/signatures #337

Closed
wants to merge 9 commits into from
Closed

Strict handling of hash/signatures #337

wants to merge 9 commits into from

Conversation

ocheron
Copy link
Contributor

@ocheron ocheron commented Jan 20, 2019

This PR:

  • Restricts received hash/signatures to make sure the peer selected from what was advertised in the "signature_algorithms" extension.
  • With TLS13, rejects use of MD5, SHA-1, RSA PKCS#1, DSS as TLS level. This is done regardless of supportedHashSignatures, which may include the algorithms for earlier protocol versions.
  • Use supportedHashSignatures to send a list of certificate types with TLS12, like was done with TLS13.
  • Aborts TLS13 without "signature_algorithms" extension (instead of using SHA-1 algorithms as default) but only when CertVerify messages are required.

Related to #194.

@kazu-yamamoto kazu-yamamoto self-requested a review January 21, 2019 04:22
Copy link
Collaborator

@kazu-yamamoto kazu-yamamoto left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

kazu-yamamoto added a commit to kazu-yamamoto/hs-tls that referenced this pull request Jan 21, 2019
@kazu-yamamoto
Copy link
Collaborator

Rebased and merged.

@ocheron ocheron deleted the strict-hashsigs branch January 21, 2019 18:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants