On Fri, 9 Apr 2021 17:23:05 GMT, Sean Mullan <mul...@openjdk.org> wrote:

>> src/java.xml.crypto/share/classes/com/sun/org/apache/xml/internal/security/algorithms/implementations/SignatureBaseRSA.java
>>  line 588:
>> 
>>> 586: 
>>> 587:         public enum DigestAlgorithm {
>>> 588: //            SHA1("SHA-1", DigestMethod.SHA1, 20),
>> 
>> Do we want to support "SHA-1"? It's considered weak and not the default but 
>> the RFC has not disabled it. Since we already have secure validation on by 
>> default, it does seem to be a security issue.
>> 
>> The "RSASSA-PSS without Parameters" section at 
>> https://tools.ietf.org/html/rfc6931#section-2.3.10 also lists SHA-224 and 
>> SHA3-**. We should probably support them as well, or at least make sure we 
>> support the same algorithms in "without Parameters" and "with Parameters".
>
> I'm ok with not supporting SHA-1, although adding it would not be a security 
> issue. It is blocked by default now, but it can be re-enabled, and SHA-1 in 
> general is still available in the JDK.
> 
> I'm fine with adding support for SHA-224 and SHA-3 as part of this issue. You 
> can add support for all the algorithms that we have the underlying crypto 
> support for.

Not sure if I got it, are you OK with adding SHA-1? It must be listed here to 
be supported.

-------------

PR: https://git.openjdk.java.net/jdk/pull/3181

Reply via email to