>>>>> "Eric" == Eric Rescorla <[EMAIL PROTECTED]> writes:

    Eric> Sorry, I don't see what you're getting at. PwdHash is
    Eric> specified to use the domain name of the server as the hash
    Eric> salt. RFC 2818 requires that that domain name match the
    Eric> server's certificate. There's nothing additional required.

The additional thing is that the specification of pwdhash uses the
        same naming for servers that tls does and that as pwdhash is
        used, it derives the name of the server it is contacting from
        the same place as TLS (the URI).

Say I replace pwdhash with an authentication scheme where the client
needs to learn from the user an identity for the server to be used at
the TLS layer (the domain name from the URI) and an identity to be
used for my upper layer authentication scheme (derived somewhere
else).

For example, SASL digest effectively names the server based on a
realm.  There's no good mapping between the server's domain name and
the realm.  So, I'm fairly certain that a server could trick you into
giving it a challenge to replay with another server.

I think HTTP digest works approximately the same way.
In this situation, TLS would not be enough to prevent MITM.

Although perhaps the difference here is that I was using a broader
definitiong of hi jacking than you were and my definition included
MITM.



_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to