On Tue, May 20, 2008 at 10:18 PM, Julien R Pierre - Sun Microsystems <
[EMAIL PROTECTED]> wrote:

> Rainer,
>
> Rainer Gerhards wrote:
> > Hi group,
> >
> > my apologies for not reading through all the docs. I have a hopefully
> > quick question and would like some short feedback before I go down
> > into all the specifics. I am working on the implementation of an
> > upcoming TLS protected syslog standard. I currently implement with
> > GnuTLS, but I have a driver layer which supports any stream-oriented
> > transport and NSS is on my TODO list as the next task when I finished
> > GnutTLS (I opted to start with GnuTLS because it has a smoother
> > learning curve for a project interested in TLS only, as discussed in
> > this group some time ago). This work is part of rsyslog, a GPLed
> > syslogd ( http://www.rsyslog.com ).
> >
> > My question is about authentication. I would like to authenticate
> > remote peers via custom authentication layed out in the standard. This
> > is fingerprint-based, very similar to SSHs leap of faith auth. I would
> > like to do this inside the TLS handshake, to be precisely after I
> > received the remote peer's Certificate but before the Finished message
> > is sent back. I am looking for something like a callback that calls me
> > at this point and permits me to do a binary permitted/not permitted
> > decision on the remote peer. This callback code must be able to
> > examine the remote certificate.
> >
> > Please note that I am specifically asking for a callback inside the
> > handshake. For technical reasons inside syslog, I would ideally need
> > to authenticate the peer during the handshake procedure, NOT after it
> > has completed.
> >
> > Is there any such functionality in NSS? If so, would it possible to
> > point me to the relevant part of the documentation?
> >
> > All feedback is deeply appreciated.
>
> Right now there is no such callback available in NSS' lbissl to do what
> you want.
>
> Why do you want to use non-standard authentication ? SSL/TLS client
> authentication is already available and standard.
> _______________________________________________
>

Fingerprint-based is not secure within TLS, not specified anywhere, and it
is an hack.

Why don't you use PSK instead?

Best regards
Badra
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to