RFR: 8245527: LDAP Cnannel Binding support for Java GSS/Kerberos
Alexey Bakhtin
alexey at azul.com
Wed May 27 14:14:43 UTC 2020
Hi Max,
You are right, It is possible that algorithm name is not confirm <digest>With<encryption> format.
As soon as RFC5929 does not specify this situation I would suggest to use “SHA-256” hash instead of throwing SaslException exception.
Regards
Alexey
> On 27 May 2020, at 13:25, Weijun Wang <weijun.wang at oracle.com> wrote:
>
>
>
>> On May 21, 2020, at 3:35 PM, Alexey Bakhtin <alexey at azul.com> wrote:
>>
>> The hash algorithm is selected on the base of the certificate signature algorithm.
>> Also, the client should use SHA-256 algorithm, in case of the certificate signature algorithm is SHA1 or MD5
>
> According to https://www.rfc-editor.org/rfc/rfc5929#section-4.1, this is the right approach. I'm just curious if you have seen newer signature algorithms like RSASSA-PSS and EdDSA used in reality, since the latest TLS spec already defined ciphersuites around them.
>
> Thanks,
> Max
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <https://mail.openjdk.org/pipermail/security-dev/attachments/20200527/02479648/signature.asc>
More information about the security-dev
mailing list