Chrome is removing support for signature algorithms using SHA-1 for server signatures during the TLS handshake. This does not affect SHA-1 support in server certificates, which was already removed, or in client certificates, which continues to be supported.
This feature can be controlled by chrome://flags/#use-sha1-server-handshakes flag and the https://chromeenterprise.google/policies/#InsecureHashesInTLSHandshakesEnabled enterprise policy.
At most 0.02% of page loads use the SHA1 fallback. However, we cannot disambiguate between a flaky first connection, and actually requiring SHA1. We expect the actual amount is lower.
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
None
n/a, this happens pre-devtools
Shipping on desktop | 117 |
DevTrial on desktop | 115 |
Shipping on Android | 117 |
DevTrial on Android | 115 |
Contact emails
dad...@google.comExplainer
NoneSpecification
https://www.rfc-editor.org/rfc/rfc9155.htmlSummary
Chrome is removing support for signature algorithms using SHA-1 for server signatures during the TLS handshake. This does not affect SHA-1 support in server certificates, which was already removed, or in client certificates, which continues to be supported.
This feature can be controlled by chrome://flags/#use-sha1-server-handshakes flag and the https://chromeenterprise.google/policies/#InsecureHashesInTLSHandshakesEnabled enterprise policy.
Blink component
Internals>Network>SSLSearch tags
tls, ssl, sha1TAG review
NoneTAG review status
Not applicableRisks
Interoperability and Compatibility
At most 0.02% of page loads use the SHA1 fallback. However, we cannot disambiguate between a flaky first connection, and actually requiring SHA1. We expect the actual amount is lower.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BEWSvOO%3D4QhGfWnRC6Q03VTqrQjPfypFKzwU7aZXGwSQ%40mail.gmail.com.
On Wed, Jun 7, 2023 at 7:15 PM 'David Adrian' via blink-dev <blin...@chromium.org> wrote:Contact emails
dad...@google.comExplainer
NoneSpecification
https://www.rfc-editor.org/rfc/rfc9155.htmlSummary
Chrome is removing support for signature algorithms using SHA-1 for server signatures during the TLS handshake. This does not affect SHA-1 support in server certificates, which was already removed, or in client certificates, which continues to be supported.
This feature can be controlled by chrome://flags/#use-sha1-server-handshakes flag and the https://chromeenterprise.google/policies/#InsecureHashesInTLSHandshakesEnabled enterprise policy.
Blink component
Internals>Network>SSLSearch tags
tls, ssl, sha1TAG review
NoneTAG review status
Not applicableRisks
Interoperability and Compatibility
At most 0.02% of page loads use the SHA1 fallback. However, we cannot disambiguate between a flaky first connection, and actually requiring SHA1. We expect the actual amount is lower.
0.02% sounds like a lot. Is there a way to get a tighter estimate of potential breakage?
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXb%2BN3EnqXO6JSQLKyTmEsL_SoCbm-5nk1zGp6LM608Lg%40mail.gmail.com.