On Tue, Nov 24, 2015 at 2:31 PM, Bill Cox <waywardg...@google.com> wrote:
>
> From the paper, it sounds like using delegated keys currently has some
> unanticipated security problems, at least in the near term while we
> continue to accept incorrectly padded RSA based certs.  Would Hugo's
> suggestions for extending certificates address weaknesses due to delegated
> keys, and allow DH keyshares to be used for proof-of-possession, and
> possibly MQV?  If so, it sounds like a valuable upgrade.
>

The underlying concern is misuse of *existing* server's signing keys to
produce essentially
permanent delegations. So, as Hugo observed, requiring a certificate
extension (or DH
certificates) removes this case. As I mentioned in my earlier message, we
discussed this
extensively at a number of meetings and came to the WG consensus that it
would
be good if someone wrote a separate draft documenting one or both of these
mechanisms,
but that it shouldn't be on the critical path for TLS 1.3. Volunteers
wanted!

-Ekr




> Thanks,
> Bill
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to