On Sat, Dec 15, 2018 at 12:01 PM Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
>
> > On Dec 15, 2018, at 8:08 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie>
> wrote:
> >
> > I don't see any point in considering the variant with the easy
> > active attack though;
>
> For the record the easy MiTM attack requires on-path TCP termination,
> only discloses the SNI name, and the full handshake then fails.  It
> looks to me like the same happens with the current draft when the
> fronting key_share is not DNSSEC-validated.


As I said in my response to Nico, it depends on the threat model. If your
concern is the local network (which is quite common), then DoH addresses
the issue.

-Ekr
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to