If a client will sign any challenge presented by any server, it open up a big 
hole.  An attacker can present a challenge that a (future) valid server will 
present, and the attacker, having the answer, can then act as the device to the 
server. For example, the attacker can intercept the server/client 
communication, present the challenge on its own, and then act as the client.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to