On Mon, Aug 24, 2015 at 2:33 PM, Paul Wouters <p...@nohats.ca> wrote:

> On Mon, 24 Aug 2015, Eric Rescorla wrote:
>
> TLS 1.3 encrypts both the client's and server's certificates already.
>> The server's certificate is secure only against passive attack.
>>
>
> Not having read the TLS 1.3 draft, in IKE parties can send a hash of the
> CAs they trust, so unless you receive a hash of a known CA to you, you
> can withold your own certificate from being sent.
>
> Is a similar mechanism not planned for TLS 1.3?


Well, TLS already permits the server to indicate the DN of CAs which should
be in the path. I have not heard of any plan to add a digest indication.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to