On May 23, 8:34 am, Rainer Gerhards <[EMAIL PROTECTED]> wrote:
> On May 20, 10:38 pm, Badra <[EMAIL PROTECTED]> wrote:
> [snip]
>
> > Fingerprint-based is not secure within TLS, not specified anywhere, and it
> > is an hack.
>
> Well, it actually is (somewhat), right there in the PSK RFC, section
> 1.1:
>
>    If the main goal is to avoid Public-Key Infrastructures (PKIs),
>    another possibility worth considering is using self-signed
>    certificates with public key fingerprints.  Instead of manually
>    configuring a shared secret in, for instance, some configuration
>    file, a fingerprint (hash) of the other party's public key (or
>    certificate) could be placed there instead.
>
> seehttp://www.ietf.org/rfc/rfc4279.txt
>
> > Why don't you use PSK instead?
>
> I guess that is why Pasi Eronen (RFC 4279 author) suggested to use
> fingerprints to the syslog wg ;)

I forgot to mention: guessing is good, verifying is better. I'll bring
up this question on the syslog WG mailing list.

Rainer
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to