As I said in another email, without client authentication (which is the
scenario in the Karthik quote), data sent by the server should be
considered secure only against passive adversaries. Any additional
assumption on confidentiality (i.e., restricting the power of an active
attacker) must consider some form of client authentication, either implicit
or explicit. Both cases must be dealt with with care, especially the
implicit ones (e.g. authentication implied by application mechanisms and
semantics).


On Thu, Feb 25, 2016 at 7:29 AM, Martin Rex <m...@sap.com> wrote:

> Karthikeyan Bhargavan wrote:
> >
> > Yes Hugo, you?re right that when there is no client auth,
> > the situation is less problematic.
>
> I'm not so sure.
>
> There might be the desire of the server to keep some data confidential,
> and your argument is that if the data wasn't confidential to begin with,
> the server is not "breaking" confidentiality--although the server is
> clearly doing this.
>
> But what about the client and the client's desire to keep confidential,
> which particular "public data" it is just requesting and receiving
> from the server.
>
>
> -Martin
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to