On Mon, Aug 24, 2015 at 05:33:18PM -0400, Paul Wouters wrote:
> On Mon, 24 Aug 2015, Eric Rescorla wrote:
>
> >TLS 1.3 encrypts both the client's and server's certificates already.
> >The server's certificate is secure only against passive attack.
>
> Not having read the TLS 1.3 draft, in IKE parties can send a hash of the
> CAs they trust, so unless you receive a hash of a known CA to you, you
> can withold your own certificate from being sent.
>
> Is a similar mechanism not planned for TLS 1.3?
This would break DANE, unless the mechanism also allowed the client
to send a TLSA RRset instead, with the server then needing code to
figure out which chains match which TLSA RRs. This is I think too
complex.
If the client is willing to live without any certificate at all,
it can include anon-(EC)DH ciphersuites in its cipherlist at a
higher preference than any ciphersuites that use certificates..
Otherwise, the server sends a suitable chain per SNI and
closest match to supported signature algorithms.
--
Viktor.
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls