On Sat, Sep 24, 2016 at 01:17:22AM +0000, Nick Sullivan wrote:
> Signature algorithm support is typically per-connection, not per
> certificate request. If you're doing multiple post-handshake
> authentications then (2) reduces the amount of redundant data sent on
> subsequent authentications. Furthermore, it opens the door for unsolicited
> post-handshake authentication in future extensions to the protocol.
> 
> Clients only need to stash a copy of it if they support client
> authentication, which in my opinion should be optional. Perhaps support for
> post-handshake authentication should be signaled with an extension. That
> way the server SignatureSchemes could be carried in that extension, rather
> than overloading the "signature_algorithms" extension.
 
But the client requires that signature list to perform authentication.
It is not optional for the in-handshake authentication.

Also, I think the post-handshake auth is just annoying (and it comes
with security problems currently), so I would like to be able to just
not implement it.


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to