On Thu, Aug 27, 2015 at 1:18 PM, Eric Rescorla <e...@rtfm.com> wrote:

>
>
> On Thu, Aug 27, 2015 at 2:14 AM, Viktor S. Wold Eide <
> viktor.s.wold.e...@gmail.com> wrote:
>
>> On Mon, Aug 24, 2015 at 11:17 PM, Eric Rescorla <e...@rtfm.com> wrote:
>>
>>>
>>>
>>> TLS 1.3 encrypts both the client's and server's certificates already.
>>> The server's certificate is secure only against passive attack. The
>>> client's is encrypted with a key that the client can authenticate as
>>> belonging to the server.
>>>
>>>
>>
>> It's good to see that both the client's and the server's certificates are
>> encrypted in TLS 1.3, providing protection against passive eavesdropping.
>>
>> For some use cases it might be worthwhile to reduce the information made
>> available to an active attacker also. Are there any suggestions in this
>> direction for TLS 1.3?
>>
>> One might think of a multi stage approach, something like:
>> - Anonymous connection establishment, resulting in a secure channel.
>> - Authentication by means of group certificate.
>> - Authentication by means of a host specific certificate.
>>
>> The purpose of the second step above is to first only provide the group
>> identity to an active attacker, and then to reveal the host identities
>> (certificate information) only after group membership has been mutually
>> authenticated
>>
>
> I don't think this matches most TLS use cases very well, since the client
> generally isn't authenticated at all, so there's no point in the server
> progressively
> revealing more.
>
>
Although the client generally is not authenticated currently, TLS 1.3 and
DTLS 1.3 are likely to stay for a long time and then to be used for lots of
different use cases, including more peer-to-peer interaction. For some
use-cases, including peer-to-peer interaction, being able to progressively
reveal more information would improve protection. Whether this is a
worthwhile tradeoff or not, depends on many different factors. I think it
is both relevant and interesting to see to what extent (D)TLS 1.3 would
support such use cases.

Best regards
Viktor S. Wold Eide
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to