On 3/12/2014 1:02 PM, Derek Atkins wrote:
Joe Touch <[email protected]> writes:

Why not just use the term "unauthenticated encryption", when that's
exactly what's happening?

Well, it's not necessarily what's happening.  The data itself might
still have "integrity protection" (which is a form of authentication.

Yes, and might be inaccessible to anyone except the endpoints that negotiated the key too.

So you have a protected exchange both in privacy and integrity, but you don't know with whom.

You're just not authenticating the endpoint, which means you could be
subject to a MitM attack.  Alternate terms could be "Unauthenticated
Keying" or "Unauthenticated Key Exchange" which are closer (IMHO) to
what's going on.

Sure - yes, but neither acronym is desirable, unfortunately.

Unidentified Security?

Joe






_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to