If a client will sign any challenge presented by any server, it open up a big hole. An attacker can present a challenge that a (future) valid server will present, and the attacker, having the answer, can then act as the device to the server. For example, the attacker can intercept the server/client communication, present the challenge on its own, and then act as the client.
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls