On 12/30/05, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:

> If you don't want the server's certificate to be eavesdroppable that's tricky
> because an attacker could simply connect to the server using (in this example)
> anon-DH and drop the connection after it has received the server's certificate
> during the renegotiation.
>
> Steve.

I'm modifying the protocol a little bit for my application --
basically, the peer who connects (the one who initiates the
connection) needs to voluntarily identify itself before the server
will volunteer any information about itself, other than that it will
talk TLS.  The server shouldn't send even a request for
identification.

(I'm going to have to go through the TLS spec again and figure out the
sequence of the protocol exchange, but it shouldn't be too different
from the standard state machine.)

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to