| rfc9155v2.txt | rfc9155.txt | |||
|---|---|---|---|---|
| Internet Engineering Task Force (IETF) L. Velvindron | Internet Engineering Task Force (IETF) L. Velvindron | |||
| Request for Comments: 9155 cyberstorm.mu | Request for Comments: 9155 cyberstorm.mu | |||
| Updates: 5246 K. Moriarty | Updates: 5246 K. Moriarty | |||
| Category: Standards Track CIS | Category: Standards Track CIS | |||
| ISSN: 2070-1721 A. Ghedini | ISSN: 2070-1721 A. Ghedini | |||
| Cloudflare Inc. | Cloudflare Inc. | |||
| November 2021 | December 2021 | |||
| Deprecating MD5 and SHA-1 Signature Hashes in (D)TLS 1.2 | Deprecating MD5 and SHA-1 Signature Hashes in (D)TLS 1.2 | |||
| Abstract | Abstract | |||
| The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to | The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to | |||
| attack, and this document deprecates their use in (D)TLS 1.2 digital | attack, and this document deprecates their use in (D)TLS 1.2 digital | |||
| signatures. However, this document does not deprecate SHA-1 in the | signatures. However, this document does not deprecate SHA-1 with | |||
| Hashed Message Authentication Code (HMAC), as used in record | Hashed Message Authentication Code (HMAC), as used in record | |||
| protection. This document updates RFC 5246. | protection. This document updates RFC 5246. | |||
| Status of This Memo | Status of This Memo | |||
| This is an Internet Standards Track document. | This is an Internet Standards Track document. | |||
| This document is a product of the Internet Engineering Task Force | This document is a product of the Internet Engineering Task Force | |||
| (IETF). It represents the consensus of the IETF community. It has | (IETF). It represents the consensus of the IETF community. It has | |||
| received public review and has been approved for publication by the | received public review and has been approved for publication by the | |||
| skipping to change at line 84 ¶ | skipping to change at line 84 ¶ | |||
| potential for brute-force attack. In 2016, researchers from the | potential for brute-force attack. In 2016, researchers from the | |||
| National Institute for Research in Digital Science and Technology | National Institute for Research in Digital Science and Technology | |||
| (INRIA) identified a new class of transcript collision attacks on TLS | (INRIA) identified a new class of transcript collision attacks on TLS | |||
| (and other protocols) that relies on efficient collision-finding | (and other protocols) that relies on efficient collision-finding | |||
| algorithms on the underlying hash constructions | algorithms on the underlying hash constructions | |||
| [Transcript-Collision]. Further, in 2017, researchers from Google | [Transcript-Collision]. Further, in 2017, researchers from Google | |||
| and Centrum Wiskunde & Informatica (CWI) Amsterdam [SHA-1-Collision] | and Centrum Wiskunde & Informatica (CWI) Amsterdam [SHA-1-Collision] | |||
| proved SHA-1 collision attacks were practical. This document updates | proved SHA-1 collision attacks were practical. This document updates | |||
| [RFC5246] in such a way that MD5 and SHA-1 MUST NOT be used for | [RFC5246] in such a way that MD5 and SHA-1 MUST NOT be used for | |||
| digital signatures. However, this document does not deprecate SHA-1 | digital signatures. However, this document does not deprecate SHA-1 | |||
| in HMAC, as used in record protection. Note that the CA/Browser | with HMAC, as used in record protection. Note that the CA/Browser | |||
| Forum (CABF) has also deprecated use of SHA-1 for use in certificate | Forum (CABF) has also deprecated use of SHA-1 for use in certificate | |||
| signatures [CABF]. | signatures [CABF]. | |||
| 1.1. Requirements Language | 1.1. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
| BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| skipping to change at line 145 ¶ | skipping to change at line 145 ¶ | |||
| IANA has also updated the reference for the "TLS SignatureAlgorithm" | IANA has also updated the reference for the "TLS SignatureAlgorithm" | |||
| and "TLS HashAlgorithm" registries to refer to this document in | and "TLS HashAlgorithm" registries to refer to this document in | |||
| addition to RFCs 5246 and 8447. | addition to RFCs 5246 and 8447. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| Concerns with (D)TLS 1.2 implementations falling back to SHA-1 is an | Concerns with (D)TLS 1.2 implementations falling back to SHA-1 is an | |||
| issue. This document updates the TLS 1.2 specification [RFC5246] to | issue. This document updates the TLS 1.2 specification [RFC5246] to | |||
| deprecate support for MD5 and SHA-1 for digital signatures. However, | deprecate support for MD5 and SHA-1 for digital signatures. However, | |||
| this document does not deprecate SHA-1 in HMAC, as used in record | this document does not deprecate SHA-1 with HMAC, as used in record | |||
| protection. | protection. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| End of changes. 4 change blocks. | ||||
| 4 lines changed or deleted | 4 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||