> Sam just ran the analysis.  The TLS 1.3 proofs they have work without
> Certificate in the transcript, which is equivalent to a zero-bit
> truncated hash.

I assume the client hello extension still has the certificate digest, yes?
This means that the analysis probably relied on agreement of the certificate 
hash from the client hello.

I’d imagine that a full security analysis of this mode depends on which model 
of certificate issuance  we use.
For example, is it possible for a website to use the same public key on two 
certificates for two different purposes? Is it possible for an attacker to 
obtain a certificate from a CA for a public key even though it does not know 
the corresponding private key? 

Also, is this mode intended to be used for RSA handshakes in TLS 1.2? In that 
case the proof of private-key possession comes quite late in the handshake. 
Even for signature-based ciphersuites, I would need to look
closer to be convinced that the ServerKeyExchange (in TLS 1.2) and 
ServerCertificateVerify (in TLS 1.3) do 
provide sufficient guarantees on which certificate/private key was used to 
create the signature.

Best,
Karthik

> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to