On Wed, Dec 30, 2015 at 11:52:07AM +0100, Kurt Roeckx wrote:
> On Tue, Dec 29, 2015 at 10:10:47PM +0200, Karthikeyan Bhargavan wrote:
> > As mentioned before, validating Curve25519 public values is necessary in 
> > TLS 1.2 without session hash.
> > Otherwise, as we pointed out in [1], the triple handshake attack returns.
> 
> Would it make sense to have session hash as a requirement in TLS
> 1.2 when you want to use Curve25519?

I don't think that is reasonable.

The RFC4492bis document could point out the consequences of omitting
the zero check (which is already REQUIRED) in the security
considerations tho.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to