>  >You can replay the CSR and get the certificate request by the original party
>  >signed by whatever CA you want, but would that do you any good if you don't
>  >have the private key?
>
>  That's exactly the point, which others have also made in the thread.  Yes, 
> you
>  can do this, but then what? 

Then publish the certificate. Then the victim is unable to read email encrypted 
to her. A DoS that costs the attacker very little, practically nothing.

>  In other words, what real-world problem are we actually solving by requiring
>  PoP,

See above.

> how much existing practice will it break by doing so, and is it worth the
> cost?

Didn't you notice that the existing practice already includes/enforces PoP? And 
does not work for KEM keys?

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to