>>>>> "Eliot" == Eliot Lear <[EMAIL PROTECTED]> writes:

    Eliot> Perhaps I'm not well enough versed to understand why this would be 
the
    Eliot> case, unless the other end can prove itself in some meaningful way in
    Eliot> the next phase that the user would actually understand.  And even 
then
    Eliot> I'm not sure that solves MITM.


It can be made to solve MITM.

My argument is that there are a number of cases where the other end can prove 
its identity in a sufficiently meaningful way at a higher level.


If it knows the same secret as I do, then it's one of the people who
knows that secret.  If only two people know the secret and I'm one of
them, well I probably know who it is.  If the other end then tells me
the name of its cert, I check that name and confirm I trust the CA,
then I have met the requirements of 4.5.

    >> I think it is quite possible to accomplish 4.5 in the case
    >> where you have an existing relationship with a site based on
    >> shared secrets.
    >> 
    Eliot> Section 4.6 assumes that there is a third party identity provider.  
This
    Eliot> needn't be the case, but if it is, it is sufficient to have a name, a
    Eliot> nonce, and a public/private key pair, is it not?
    >> 

All this is true.
I don't see how it has anything to do with 4.6.

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to