"known in advance" public key authentication?

Ivan Shmakov oneingray at gmail.com
Thu Nov 8 04:18:26 CET 2012


>>>>> Florian Weimer <fw at deneb.enyo.de> writes:

[…]

 > Make sure your certificates are valid X.509v3.  GNUTLS is extremely
 > forgiving, and if you've got a widely deployed certificate which
 > cannot be used with Java (for instance), this can be annoying.

	Even if I'd choose to follow this path, the certificates will be
	generated “on demand”, using the information the application has
	access to.  Should such certificates be found unsuitable for a
	particular TLS implementation, I'd only need to amend the
	generation procedure, and regenerate the offending certificates.
	(Though, indeed, that may take a good deal of time should the
	application in question become widely deployed.)

	That being said, I've got an impression that OpenPGP
	certificates and keys are much more simple to generate (from C
	code, at the least.)  Do I understand it correctly that the
	support for OpenPGP certificates isn't implemented as widely as
	that for X.509 ones?

	The other idea would be to use “anonymous” authentication, and
	then perform a kind of a “check” against MitM on the already
	established channel.  Is there a way to initiate a “re-keying”
	using a caller-provided symmetric key, for instance?

	OTOH, most of the data transferred over such a channel will
	either be public (and then either self-certifying or signed) or
	already encrypted anyway.  Thus, for a start, I may forget about
	authentication altogether.  Unfortunately, some fraction of the
	data is likely to be at least mildly sensitive, and apart from
	that, an authenticated channel opens a possibility of a DoS.

-- 
FSF associate member #7257





More information about the Gnutls-help mailing list