RFC 9155: Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2
- L. Velvindron,
- K. Moriarty,
- A. Ghedini
Abstract
The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS 1.2 digital signatures. However, this document does not deprecate SHA-1 with Hashed Message Authentication Code (HMAC), as used in record protection. This document updates RFC 5246.¶
Status of This Memo
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
The usage of MD5 and SHA-1 for signature hashing in (D)TLS 1.2 is specified in [RFC5246]. MD5 and SHA-1 have been proven to be insecure,
subject to collision attacks [Wang]. In 2011, [RFC6151] detailed the security considerations, including collision attacks
for MD5.
NIST formally deprecated use of SHA-1 in 2011
[NISTSP800
1.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
2. Signature Algorithms
Clients MUST include the signature
3. Certificate Request
Servers SHOULD NOT include MD5 and SHA-1 in Certificate
4. Server Key Exchange
Servers MUST NOT include MD5 and SHA-1 in Server
5. Certificate Verify
Clients MUST NOT include MD5 and SHA-1 in Certificate
6. IANA Considerations
IANA has updated the "TLS Signature
IANA has also updated the reference for the "TLS Signature
7. Security Considerations
Concerns with (D)TLS 1.2 implementations falling back to SHA-1 is an issue. This document updates the TLS 1.2 specification [RFC5246] to deprecate support for MD5 and SHA-1 for digital signatures. However, this document does not deprecate SHA-1 with HMAC, as used in record protection.¶
8. References
8.1. Normative References
- [RFC2119]
-
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10
.17487 , , <https:///RFC2119 www >..rfc -editor .org /info /rfc2119 - [RFC5246]
-
Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, DOI 10
.17487 , , <https:///RFC5246 www >..rfc -editor .org /info /rfc5246 - [RFC8174]
-
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10
.17487 , , <https:///RFC8174 www >..rfc -editor .org /info /rfc8174 - [RFC8446]
-
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10
.17487 , , <https:///RFC8446 www >..rfc -editor .org /info /rfc8446 - [RFC8447]
-
Salowey, J. and S. Turner, "IANA Registry Updates for TLS and DTLS", RFC 8447, DOI 10
.17487 , , <https:///RFC8447 www >..rfc -editor .org /info /rfc8447
8.2. Informative References
- [CABF]
-
CA/Browser Forum, "Ballot 118 -- SHA-1 Sunset (passed)", , <https://
cabforum >..org /2014 /10 /16 /ballot -118 -sha -1 -sunset / - [NISTSP800
-131A -R2] -
Barker, E. and A. Roginsky, "Transitioning the Use of Cryptographic Algorithms and Key Lengths", NIST Special Publication 800-131A, Revision 2, DOI 10
.6028 , , <https:///NIST .SP .800 -131Ar2 nvlpubs >..nist .gov /nistpubs /Special Publications /NIST .SP .800 -131Ar2 .pdf - [RFC6151]
-
Turner, S. and L. Chen, "Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms", RFC 6151, DOI 10
.17487 , , <https:///RFC6151 www >..rfc -editor .org /info /rfc6151 - [SHA
-1 -Collision] -
Stevens, M., Bursztein, E., Karpman, P., Albertini, A., and Y. Markov, "The First Collision for Full SHA-1", , <https://
eprint >..iacr .org /2017 /190 - [Transcript
-Collision] -
Bhargavan, K. and G. Leurent, "Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH", DOI 10
.14722 , , <https:///ndss .2016 .23418 hal >..inria .fr /hal -01244855 /document - [Wang]
-
Wang, X., Yin, Y., and H. Yu, "Finding Collisions in the Full SHA-1", DOI 10
.1007 , , <https:///11535218 _2 www >..iacr .org /archive /crypto2005 /36210017 /36210017 .pdf
Acknowledgements
The authors would like to thank Hubert Kario for his help in writing the initial draft version of this document. We are also grateful to Daniel Migault, Martin Thomson, Sean Turner, Christopher Wood, and David Cooper for their feedback.¶