Hi, My apologies if I appeared a little aggressive in pursuing my incorrect idea. I have to learn a lot.
Looking forward to your guidance in future also, Thanks and Regards, Sankalp Bagaria. On Mon 18 Feb, 2019, 1:51 PM Eliot Lear, <l...@cisco.com> wrote: > Just to add- this is what the plethora of BRSKI drafts are attempting to > address in 6tisch, ANIMA, and EMU. If there is to be a new mechanism, I > encourage that it be listed on the GitHub page at > https://github.com/iot-onboarding/catalog. Both the README.md file and > the Onboard-Table file should be updated. PRs welcome. > > On 18 Feb 2019, at 04:29, Salz, Rich <rs...@akamai.com> wrote: > > If a client will sign any challenge presented by any server, it open up a > big hole. An attacker can present a challenge that a (future) valid server > will present, and the attacker, having the answer, can then act as the > device to the server. For example, the attacker can intercept the > server/client communication, present the challenge on its own, and then act > as the client. > > _______________________________________________ > T2TRG mailing list > t2...@irtf.org > https://www.irtf.org/mailman/listinfo/t2trg > > >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls