On Wednesday, 27 March 2019 14:51:43 CET Martin Thomson wrote:
> On Tue, Mar 26, 2019, at 14:30, Hubert Kario wrote:
> > On Tuesday, 26 March 2019 09:07:51 CET Martin Thomson wrote:
> > > We don't trust that the key share or certificate is good either, but
> > > once we have a Finished message, that is retroactively authenticated
> > > and can be used.  We rely on this property for a bunch of things.
> > 
> > yes, but those things are part of the protocol, not destined for
> > application (or even if they are, they are actionable only after the
> > handshake finished)
> Yep, but that's something that QUIC relies on already.  As does ALPN.  And
> it is likely that there are other things that I can't think of in my
> current frazzled state.

how is ALPN similar?

 a). the information gained by processing the handshake only up to 
     EncryptedExtensions with ALPN is "what protocol server is willing to use"
 b). that information is useful _only_ for establishing future _TLS_ 
     connections and guides what happens _after_ the handshake is finished

OTOH, the information gained from client-net-address is useful outside the TLS 
scope
-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to