On 04/16/2017 01:42 PM, Eric Rescorla wrote:
> https://github.com/tlswg/tls13-spec/pull/950
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_tlswg_tls13-2Dspec_pull_950&d=DwMFaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=sssDLkeEEBWNIXmTsdpw8TZ3tAJx-Job4p1unc7rOhM&m=BjaFsdt8oZioHhmwlbgMF3WDFeiFsVIRexCKXzHIAUc&s=t6YKj0u1crtFYnjfk8z-a1r1HtpZNW0t5dnZGwUQIWY&e=>
>
> Target merge date: Tuesday
>
> I have just posted PR#950, which recommends that servers generate
> unpredictable
> context values for CertificateRequest in post-handshake client
> authentication. This
> prevents attacks in which an attacker who has temporary access to the
> client's
> private key can forge valid CertificateVerify messages.
>
> Note that this is not an enormously large improvement because an
> attacker who
> has temporary access the private key can do a bunch of other stuff,
> like forging
> a complete handshake message, but I can imagine some artificial scenarios
> where it might be useful, for instance if the user's private key is an
> HSM and
> so the attacker has permanent control of the user's machine but can't
> get him
> to generate an arbitrary number of private key operations without
> detection.
>
> Unless I have missed something, this seems like harmless advice, so I tend
> to think we should add it. Comments welcome
>

Sounds like a good idea.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to