Hi,

Please see the comments inline.

On Mon 18 Feb, 2019, 8:59 AM Salz, Rich, <rs...@akamai.com> wrote:

> If a client will sign any challenge presented by any server, it open up a
> big hole.  An attacker can present a challenge that a (future) valid server
> will present, and the attacker, having the answer, can then act as the
> device to the server.
>
Replay attack is avoided by using a challenge/ response pair only once.
2^32 combinations possible for 32 byte challenge.

Server is authenticated by its certificate. An attacker will not be able to
do so.

> For example, the attacker can intercept the server/client communication,
> present the challenge on its own, and then act as the client.
>

 MiTM attack is not possible since server is authenticated by certificate.
> An attacker will not have the private key of the server.
>
Thanks and Regards,
Sankalp Bagaria..

>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to