On 15 November 2016 at 18:11, Nikos Mavrogiannopoulos <n...@redhat.com> wrote: >> I'm not seeing quite enough information here to implement this. How >> does a server know which of the many HOTP keys it has are in use? >> Surely you can't use the same HOTP key with every client. > > Not sure I understand the question, but I'd suggest to read the text on > generating the hotp keys.
OK, I re-read it. It wasn't particularly clear from the overview. But you generate the HOTP based on an exporter. That means that the server has no control over the contents of the CID, direct or otherwise. This means that you can guarantee privacy, but it forces the server to do an exhaustive search of all of its active connections (that is, O(N)) when it gets a 5-tuple mismatch. There are probably designs that don't have this property. For instance, the server could propose an identifier or set of identifiers. That means that a bad server could willfully break the privacy property, but it also means that it doesn't have the scaling issues. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls