My place of work has experienced a problem where Chrome 56 responds to our servers' TLS "server hello done" packet with a fatal "illegal parameter" message. Chrome 54 has been working fine. Our servers are using Symantec-issued ECC certs using the NIST 256 curve and signed with SHA-2 256. Interestingly, if we disable ECDSA our our list of available ciphers, Chrome 56 negotiates successfully using a standard RSA-2048 certificate.
In troubleshooting this issue, I visited
facebook.com, which appears to have functional ECDSA negotiation with Chrome 56. In reviewing their wildcard *.
facebook.com certificate, I noted that it is reporting its signature algorithm as being "sha256RSA", not "sha256ECDSA".
Did I miss an announcement somewhere that Chrome is no longer allowing EC certificates to identify themselves with "sha256ECDSA", as part of the SHA-1 deprecation?