Hi,

My apologies if I appeared a little aggressive in pursuing my incorrect
idea. I have to learn a lot.

Looking forward to your guidance in future also,
Thanks and Regards,
Sankalp Bagaria.

On Mon 18 Feb, 2019, 1:51 PM Eliot Lear, <l...@cisco.com> wrote:

> Just to add- this is what the plethora of BRSKI drafts are attempting to
> address in 6tisch, ANIMA, and EMU.  If there is to be a new mechanism, I
> encourage that it be listed on the GitHub page at
> https://github.com/iot-onboarding/catalog.  Both the README.md file and
> the Onboard-Table file should be updated.  PRs welcome.
>
> On 18 Feb 2019, at 04:29, Salz, Rich <rs...@akamai.com> wrote:
>
> If a client will sign any challenge presented by any server, it open up a
> big hole.  An attacker can present a challenge that a (future) valid server
> will present, and the attacker, having the answer, can then act as the
> device to the server. For example, the attacker can intercept the
> server/client communication, present the challenge on its own, and then act
> as the client.
>
> _______________________________________________
> T2TRG mailing list
> t2...@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg
>
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to