Just to add- this is what the plethora of BRSKI drafts are attempting to 
address in 6tisch, ANIMA, and EMU.  If there is to be a new mechanism, I 
encourage that it be listed on the GitHub page at 
https://github.com/iot-onboarding/catalog 
<https://github.com/iot-onboarding/catalog>.  Both the README.md file and the 
Onboard-Table file should be updated.  PRs welcome.

> On 18 Feb 2019, at 04:29, Salz, Rich <rs...@akamai.com> wrote:
> 
> If a client will sign any challenge presented by any server, it open up a big 
> hole.  An attacker can present a challenge that a (future) valid server will 
> present, and the attacker, having the answer, can then act as the device to 
> the server. For example, the attacker can intercept the server/client 
> communication, present the challenge on its own, and then act as the client.
> 
> _______________________________________________
> T2TRG mailing list
> t2...@irtf.org <mailto:t2...@irtf.org>
> https://www.irtf.org/mailman/listinfo/t2trg 
> <https://www.irtf.org/mailman/listinfo/t2trg>

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to