On Wednesday, June 29, 2016 7:37 PM, Geoffrey Keating wrote:
> 
> Kyle Rose <kr...@krose.org> writes:
> 
> > Let's finish that last sentence:
> >
> > I have to think a lot more about the IoT/resource-constrained client
> > problem, but I still don't think the existence of clients that would be
> > denied service by this scheme renders the concept completely inapplicable.
> 
> Perhaps for the resource-constrained/IoT situation, what you want is
> to mostly be using a pre-shared key, track clients, and only make the
> suspicious (too many connections too fast) or new ones solve the
> puzzle.

I am also a little worried that this can become a mechanism to DOS the clients. 
Imagine an adversary capable of redirecting a client request, either by hacking 
the DNS or hacking a proxy. The hacked server can send the client a puzzle, and 
force the client into spending some energy. And with the proposed extension, 
all that happens before the client has a chance to authenticate the server.

-- Christian Huitema


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to