On Tue, 2016-11-15 at 18:10 +0900, Martin Thomson wrote:
> On 15 November 2016 at 17:34, Fossati, Thomas (Nokia - GB)
> <thomas.foss...@nokia.com> wrote:
> > 
> > The draft proposes two ways to allocate the identifier (see 3rd
> > para of
> > https://thomas-fossati.github.io/draft-tls-cid/#rfc.section.1):
> > 1. Server decides unilaterally a value that is fixed for the
> > duration of
> > the session (SecAssocType.fixed);
> > 2. Server and Client agree on a sequence of values generated using
> > HOTP
> > [RFC 4226] seeded by the session shared secret (SecAssocType.hotp);
> > Client
> > shifts to the next value when needed (e.g. on transport handover).
> > 
> > 
> > At first this might not look particularly elegant, but there are
> > good
> > reasons for having both methods.
> 
> I'm not seeing quite enough information here to implement this.  How
> does a server know which of the many HOTP keys it has are in use?
> Surely you can't use the same HOTP key with every client.

Not sure I understand the question, but I'd suggest to read the text on
generating the hotp keys.

regards,
Nikos

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to