Mathias Sundman wrote:
On Wed, 18 May 2005, Ken Goldman wrote:

All correct for authentication.  There are times that public keys or
certificates are encrypted using a DH protocol for privacy.  You might
not want a man in the middle to track where you go, and a certificate
is your identity.


Correct me if I'm wrong, but my understanding is that you should never be afraid of exposing your certificate. A certificate alone does NOT prove your identity. You must always prove your indentity by using your private key to respond to a challange. So there is no need to protect the certificate.

The fact a proof was performed might be of interest for someone. Proof transcript could be easily verifiable by any 3rd party. Any it could be available to any 3rd party (unlike the data sent after handshake).

No one could say that YOU have visited a place just because someone has showed them your certificate, without proving it's ownership using the corresponding private key.

Yes, just a certificate does not help a 3d party to create a new proof. However, it could be used to verify signature created as a proof for an old session with client authentication.

It was described already, anyway:
SSL authentication with client certificate is done by signing
a hash of protocol messages. This signature is verifiable
with public key from client certificate. Both certificate and signatures
are sent over the wire as cleartext, unless client authentication
is requested while re-negotiation.

So, a signed (and universally verifiable) proof of visiting a site
is available for any 3rd party listening to the wire.

The same applies to the aggressive mode of IKE

Under what circumstances do you use DH to protect the transfer of a
certificate? My understanding is that DH is mosly used to establish a secure channel through which you exchange the key for a symmetric cipher used for the encryption of the data that will follow.

Main mode of IKE with certificate-based authentication do DH after 2nd exchange and use the common secret established to encrypt the last (3rd) exchange with identity, certificates and signature inside.

Hope this is clear enough,
Vadym
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to