On Tue, 9 Aug 2022 at 08:50, Martin Thomson wrote:

> On Tue, Aug 9, 2022, at 16:36, Ben Smyth wrote:
> > On Mon, 8 Aug 2022 at 15:21, Töma Gavrichenkov wrote:
> >> "Upon receiving the server's messages, the client responds with its
> Authentication messages, namely Certificate and CertificateVerify (if
> requested), and Finished. At this point, the handshake is complete"
> >
> > I stumbled with this.
>
> That seems clear enough to me.  At least from the client's perspective.
> Presumably the server has to receive the client's Finished to consider the
> handshake complete.
>

For me there was a eureka! moment, when I finally understood, suddenly
everything fell into place. It could have been an easier journey; I don't
know whether I can better explain.

There are handshake messages, there's handshaking, and there's handshake
completion. Handshaking is an exchange of handshake messages. Handshake
messages are also exchanged post handshake completion. A handshake
partially completes on sending/receiving a server's Finished message---a
server can send application data thereafter---an authenticated channel from
the server to a client is established. A handshake fully completes on
sending/receiving the client's (first) Finished message, a channel
(optionally, authenticated) from the client to the server is established.
Post-handshake authentication adds a twist, further client Finished
messages may be sent/received.

>From the above, we see two points at which the handshake completes, and a
further two points of partial completion.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to