On 15 November 2016 at 17:34, Fossati, Thomas (Nokia - GB)
<thomas.foss...@nokia.com> wrote:
> The draft proposes two ways to allocate the identifier (see 3rd para of
> https://thomas-fossati.github.io/draft-tls-cid/#rfc.section.1):
> 1. Server decides unilaterally a value that is fixed for the duration of
> the session (SecAssocType.fixed);
> 2. Server and Client agree on a sequence of values generated using HOTP
> [RFC 4226] seeded by the session shared secret (SecAssocType.hotp); Client
> shifts to the next value when needed (e.g. on transport handover).
>
>
> At first this might not look particularly elegant, but there are good
> reasons for having both methods.

I'm not seeing quite enough information here to implement this.  How
does a server know which of the many HOTP keys it has are in use?
Surely you can't use the same HOTP key with every client.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to