Restricting signature algorithms for a TLS1.3 session #315
Replies: 3 comments 1 reply
-
At first glance over the required code, it seems you are not missing anything, but the key As a workaround my suggestion would be to build |
Beta Was this translation helpful? Give feedback.
-
Yeah - this is a bug in OpenSSL (openssl/openssl#22761) - although that bug talks about the config file, it basically applies to anyway of trying to configure the sigalgs to something other than the default. |
Beta Was this translation helpful? Give feedback.
-
Thank you for the answer @baentsch, @mattcaswell :-) I guess i can expect this to be corrected in a future version of openssl (which is quite enough !). Currently for a workaround, if I can enforce using hybrid certificates on client and server side can I be confident that both algorithms will be used ? I'm unsure whether current hybrid certificates signature is made of concatenated signatures from both algorithms (that are verified separately) or contains a single signature using both algorithms... |
Beta Was this translation helpful? Give feedback.
-
Hi,
I'm currently configuring an application for TLS1.3 using oqsprovider, everything is working quite well with hybrid certificates and KEM algorithms.
While I'm able to restrict supported groups through SSL_set1_groups_list(), I can't seem to use SSL_set1_sigalgs_list() to restrict supported signature to oqs signature algorithms (using a string list such as "dilithium3+SHA384" or "p384_dilithium3+SHA384:dilithium3+SHA384").
Am I missing something or is it currently not available ?
Best regards !
Beta Was this translation helpful? Give feedback.
All reactions