On Wed, 11 Sep 2013, Russ Housley wrote:

The tlsdate program (with origins in the TOR project) makes use of this value 
in the nonce portion of the handshake.

I think that the time is an important part of the nonce.  Even if the 
implementation has a crappy random number generator, the time value does a good 
job of ensuring that the nonce value is not repeated.  Obviously, the time 
value does not help with the unpredictability, but the random value is supposed 
to do that.

Note that tlsdate is a stowaway on board a TLS server. If we can
accomodate, then fine. But we shouldn't go out of our way to support it.

Between making tls less vulnerable to fingerprinting (which helps tor)
and supporting tlsdate, I'd opt for the former.


Paul
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to