Expand description
TLS connection types.
§Commitment
During the TLS handshake the Notary receives the Server’s ephemeral public key, and this key serves as a binding commitment to the identity of the Server. The ephemeral key itself does not reveal the Server’s identity, but it is bound to it via a signature created using the Server’s X.509 certificate.
A Prover can withhold the Server’s signature and certificate chain from the Notary to improve privacy and censorship resistance.
§Proving the Server’s identity
A Prover can prove the Server’s identity to a Verifier by sending a
ServerIdentityProof
. This proof contains all the information required to
establish the link between the TLS connection and the Server’s X.509
certificate. A Verifier checks the Server’s certificate against their own
trust anchors, the same way a typical TLS client would.
Structs§
- X.509 certificate, DER encoded.
- TLS session information.
- TLS 1.2 handshake data.
- Commitment to a server certificate.
- Server certificate and handshake data.
- Opens a
ServerCertCommitment
. - Server’s ephemeral public key.
- TLS server identity proof.
- Error for
ServerIdentityProof
. - Server’s name, a.k.a. the DNS name.
- Server’s signature of the key exchange parameters.
- Transcript length information.
Enums§
- Errors that can occur when verifying a certificate chain or signature.
- TLS handshake data.
- Type of a public key.
- Signature scheme on the key exchange parameters.
- TLS version.