On Mon, Jan 11, 2016 at 12:12:47AM -0800, Watson Ladd wrote:
> On Mon, Jan 11, 2016 at 12:03 AM, Ilari Liusvaara
> >
> > I don't think this is signficant. If you want protection from THS that
> > actually works, you require EMS anyway (or ensure THS is of no
> > consequence at application layer), not try to do TLS configuration
> > "workarounds" (that don't actually work).
> 
> Are you saying that a Suite B only deployment of TLS which does point
> validation is THS vulnerable?

If both ends are Suite B only, highly unlikely... However, things get
more exciting (as in "exciting crypto") if one end is and the other
isn't...

(Suite B isn't special here, there are other possible profiles
with similar properties).


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to