The logic doesn't make sense in this position. "Crypto modules can't use MD5, thus no protocols at all should use MD5." ________________________________________ From: ietf-bounces@xxxxxxxx [ietf-bounces@xxxxxxxx] On Behalf Of Francis Dupont [Francis.Dupont@xxxxxxxxxx] Sent: Wednesday, December 08, 2010 9:55 AM To: L.Wood@xxxxxxxxxxxx Cc: wes@xxxxxxxxxxxxxxx; iesg@xxxxxxxx; ietf@xxxxxxxx Subject: Re: Last Call: <draft-turner-md5-seccon-update-07.txt> (Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms) to Informational RFC I have a concern about no security usages of MD5 for practical reasons: in some environments, including US Gov, crypto implementations (e.g., FIPS 140-2 HSMs) are required to not support MD5 so you can have to choose between a compliant application and a conformant crypto, for instance for DNS TSIG... So IMHO it is still a good idea to avoid MD5 in any uses, even when it is still far to have been proved insecure or for an use which is not about security. This could be caught by the "DEPRECATED" keyword in the registry but this registry doesn't seem to have usage entries?! To conclude I am fine with the implicit conclusion of the I-D to not use MD5 or HMAC-MD5 in new protocols. Thanks Francis.Dupont@xxxxxxxxxx PS: I am the gen-art reviewer for this document too. _______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf _______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf