"Or what we do in WebRTC, which uses a certificate that has no good
information in it?”

+1. Anxiously waiting for response on this, as I am currently helping 
non-profit groups build a private and secure P2P Messaging System using WebRTC, 
which of course utilizes encrypted P2P connection between two browsers (A 
centralized signaling server must be at the middle as a broker for the sessions)

The DTLS handshake performed between two WebRTC clients re-lies on self-signed 
certificates. As a result, the certificates themselves cannot be used to 
authenticate the peer, as there is no explicit chain of trust to verify.

Ron


From: TLS <tls-boun...@ietf.org<mailto:tls-boun...@ietf.org>> on behalf of 
Martin Thomson <martin.thom...@gmail.com<mailto:martin.thom...@gmail.com>>
Date: Friday, August 28, 2015 at 11:44 AM
To: Eric Rescorla <e...@rtfm.com<mailto:e...@rtfm.com>>
Cc: "tls@ietf.org<mailto:tls@ietf.org>" <tls@ietf.org<mailto:tls@ietf.org>>
Subject: Re: [TLS] Deprecate DH_anon in favor of raw public keys?

Or what we do in WebRTC, which uses a certificate that has no good
information in it?

________________________________

CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain 
confidential information of Five9 and/or its affiliated entities. Access by the 
intended recipient only is authorized. Any liability arising from any party 
acting, or refraining from acting, on any information contained in this e-mail 
is hereby excluded. If you are not the intended recipient, please notify the 
sender immediately, destroy the original transmission and its attachments and 
do not disclose the contents to any other person, use it for any purpose, or 
store or copy the information in any medium. Copyright in this e-mail and any 
attachments belongs to Five9 and/or its affiliated entities.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to