Just to add- this is what the plethora of BRSKI drafts are attempting to address in 6tisch, ANIMA, and EMU. If there is to be a new mechanism, I encourage that it be listed on the GitHub page at https://github.com/iot-onboarding/catalog <https://github.com/iot-onboarding/catalog>. Both the README.md file and the Onboard-Table file should be updated. PRs welcome.
> On 18 Feb 2019, at 04:29, Salz, Rich <rs...@akamai.com> wrote: > > If a client will sign any challenge presented by any server, it open up a big > hole. An attacker can present a challenge that a (future) valid server will > present, and the attacker, having the answer, can then act as the device to > the server. For example, the attacker can intercept the server/client > communication, present the challenge on its own, and then act as the client. > > _______________________________________________ > T2TRG mailing list > t2...@irtf.org <mailto:t2...@irtf.org> > https://www.irtf.org/mailman/listinfo/t2trg > <https://www.irtf.org/mailman/listinfo/t2trg>
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls