> ----- Original Message -----
>>> Hello,
>>> 3) Similar to OpenPGP: Negotiate cert-type
>>>
>>> There is a cert-type for X.509 and for OpenPGP; add one for Kerberos 
>>> Tickets.
>>> PRO: Good integration with TLS: Tickets are transported in the
>>> ClientCertificate, and an Authenticator is the ClientVerify.  DH is
>>> independent and can move to the earlier phase for TLS 1.3.
>>> CON: Decision on client credential type must be made in ClientHello, when 
>>> not
>>> all data may be available (namely, the sequence of tickets leading to the
>>> TLS-protected service).  Also impacts the cert-type used in the ServerCert.
>>
>> What messages do you need to transfer for Kerberos? Is it only a ping-pong? 
>> In that
>> case, do the supplemental data from RFC4680 provide a solution with PSK in 
>> TLS 1.2?
>>

> 4680 says "[a]ny such data MUST NOT need to be processed by the TLS
> protocol.", which seems to disqualify it from applicability here.

That's interesting and open to interpretation, but I don't think it is 
applicable.
If you simply use it to derive a key for PSK, it is equivalent to reading a key 
from
a password file using the username provided.

regards,
Nikos

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to