Hi Hubert, Can you elaborate on how "TLS is a providing integrity and authenticity to the IP address information"? In my understanding, TLS only provides integrity and authenticity to a byte stream, not to how your byte stream is being transported over the network.
Thanks, David On Mon, Mar 25, 2019 at 12:31 PM Hubert Kario <hka...@redhat.com> wrote: > I wanted to rise one comment on the IETF session, but we ran out of time: > > given that TLS is a providing integrity and authenticity to the IP address > information, shouldn't the protocol require the client to perform the full > handshake and only then request information from the server? I.e. make it > a > post-handshake messages, like KeyUpdate, rather than an extension. > > I worry that some clients may short-circuit processing and do the > handshake > only up to EncryptedExtensions, without processing CertificateVerify or > Finished (in case of PSK), and in result expose themselves to MitM attacks. > -- > Regards, > Hubert Kario > Senior Quality Engineer, QE BaseOS Security team > Web: www.cz.redhat.com > Red Hat Czech s.r.o., Purkyňova 115, 612 00 Brno, Czech > Republic_______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls