RFC 9261 Quiz

Exported Authenticators in TLS

0 / 0

References (URLs)

Goal: reason about post-handshake identity proof, connection-bound validation, and the boundary between TLS library behavior and application protocol policy.

Q1: What is the main role of an Exported Authenticator in RFC 9261

Multiple Choice
**Explanation:** **Question intent:** Separate the small TLS mechanism from larger identity, attestation, and authorization systems. **Terms:** **Exported Authenticator** is a post-handshake proof that a peer controls an identity. **Post-handshake** means after the TLS or DTLS connection has already been established. **Options:** - A (incorrect): RFC 9261 uses identities such as X.509 certificates; it does not replace the certificate format. - B (correct): This is the core purpose of the mechanism. - C (incorrect): Larger frameworks must be defined by the application protocol, verifier policy, or deployment. **Related keywords:** - **Exported Authenticator** : proof of identity possession bound to an existing TLS or DTLS connection - **post-handshake** : after the secure connection is already established - **application building block** : a component that an application protocol must still integrate

Q2: Which limits remain outside RFC 9261 itself. Select all

Multi-Select
**Explanation:** **Question intent:** Learn where the RFC stops so that a report does not credit RFC 9261 with policy decisions it never makes. **Terms:** **Verifier policy** decides what identity or attestation is acceptable. **Application-level meaning** is the tenant, service, task, or authorization decision attached to the proof. **Options:** - A (correct): RFC 9261 does not know the intended tenant, workload, or policy. - B (incorrect): The RFC does define connection-derived authentication material. - C (correct): These are supplied outside the RFC mechanism. - D (correct): Authenticators are independent and unidirectional; creating or validating one does not explicitly change TLS state. **Related keywords:** - **verifier policy** : the rule that decides whether a presented identity is acceptable - **application protocol** : the layer that carries requests and gives them meaning - **TLS state** : the internal protocol state of the TLS connection

Q3: Which statements about certificate_request_context are correct. Select all

Multi-Select
**Explanation:** **Question intent:** Treat a small request field as a security control, not as harmless metadata. **Terms:** **certificate_request_context** is an opaque value attached to the request and echoed in the authenticator. **Opaque** means the protocol treats it as bytes, not as a human-readable name. **Options:** - A (correct): It connects the request to the response. - B (incorrect): Reuse can create replay or context-confusion risk. - C (correct): Uniqueness is required inside the connection scope. - D (correct): Unpredictability helps against precomputation when a temporary private key is exposed. **Related keywords:** - **certificate_request_context** : opaque request identifier echoed in the authenticator - **replay resistance** : preventing an old proof from being accepted in the wrong place - **context confusion** : accepting a proof for a different request or purpose

Q4: What must be checked for a non-empty authenticator

Multiple Choice
A non-empty authenticator is more than a certificate chain.
Certificate identity chain CertificateVerify private-key proof Finished MAC check
**Explanation:** **Question intent:** Avoid reducing a real Exported Authenticator to "certificate plus signature." **Terms:** **CertificateVerify** proves possession of the private key over an authenticator transcript. **Finished** checks a MAC derived from the TLS connection and authenticator transcript. **Options:** - A (incorrect): This omits the proof and transcript checks. - B (correct): RFC 9261 validation depends on the connection, the request, and the authenticator transcript. - C (incorrect): Certificate name checks are not enough. **Related keywords:** - **CertificateVerify** : signature proving private-key possession in the right transcript - **Finished** : MAC check over authenticator transcript material - **transcript** : ordered bytes that the proof is computed over

Q5: How should cross-connection reuse be judged

Multiple Choice
A proof generated on one connection should not validate on another connection.
Connection A generates authenticator reuse attempt Connection B validates proof Fail context mismatch
**Explanation:** **Question intent:** Keep the formal-model claim narrower than a claim about breaking the full RFC mechanism. **Terms:** **Handshake Context** is derived from the connection and authenticator data. **Channel binding** means the proof is tied to one specific TLS or DTLS connection. **Options:** - A (incorrect): Same certificate is not enough. - B (incorrect): Omitting the full validation path leaves a proof obligation, not a complete RFC break. - C (correct): RFC 9261 says validation fails when generation and validation use different connections. **Related keywords:** - **Handshake Context** : connection-derived value used in validation - **channel binding** : tying proof to a specific connection - **reduced model** : simplified model that cannot prove every RFC validation property

Q6: What does an empty authenticator mean

Multiple Choice
**Explanation:** **Question intent:** Distinguish "valid protocol object" from "identity was authenticated." **Terms:** **Empty authenticator** contains a Finished message without Certificate or CertificateVerify. **Authenticated refusal** means the refusal has integrity, but it does not prove an identity. **Options:** - A (correct): RFC 9261 treats a well-formed empty authenticator as a refusal; validation APIs return it as invalid for identity validation. - B (incorrect): No attestation or identity is authenticated. - C (incorrect): It is unrelated to version upgrade signaling. **Related keywords:** - **empty authenticator** : Finished-only refusal object - **authenticated refusal** : protected refusal, not identity success - **identity validation** : deciding that a presented identity was proven

Q7: For an aTLS deployment, which policy checks follow from empty-authenticator handling. Select all

Multi-Select
**Explanation:** **Question intent:** Translate the RFC behavior into the application policy question without calling it an RFC violation by itself. **Terms:** **Attestation required** is a policy decision by the application. **No attestation identity** means the protocol object did not return an identity that the policy can approve. **Options:** - A (correct): Required attestation cannot be successful if no identity is returned. - B (correct): Processing a valid EA object and verifying attestation are different outcomes. - C (incorrect): Empty authenticators are valid refusals, not attestation success. - D (correct): A caller needs an unambiguous result to enforce policy. **Related keywords:** - **aTLS deployment** : the application setting where attestation policy is being evaluated - **attestation identity** : identity evidence that a verifier policy can approve - **policy result** : the application-visible success, refusal, or failure decision

Q8: How should the current same-endpoint formal models be read

Multiple Choice
**Explanation:** **Question intent:** Keep model conclusions aligned with what the model actually includes. **Terms:** **Reduced model** means a simpler model that leaves out some details. **Proof obligation** means something that still needs to be shown in the full system. **Options:** - A (incorrect): That is stronger than the model supports. - B (correct): The model omits the full CertificateVerify and Finished transcript checks. - C (incorrect): Those checks are central to non-empty authenticator validation. **Related keywords:** - **same-endpoint model** : model focused on one endpoint setting - **abstraction** : simplifying away details to study a narrower property - **proof obligation** : claim that still needs full-system validation

Q9: How should an exporter-label finding in this report be scoped

Multiple Choice
**Explanation:** **Question intent:** Prevent a deployment-specific parameter issue from being misread as a defect in RFC 9261 labels. **Terms:** **Exporter label** names a TLS exporter use. **Attestation binder** is a deployment-specific value that links attestation evidence to the protocol context. **Options:** - A (incorrect): The finding is not a claim that RFC 9261's registered labels are incorrect. - B (incorrect): Labels and binder parameters can matter to policy design. - C (correct): The scope is deployment-specific parameters and verifier policy. **Related keywords:** - **exporter label** : string separating one TLS exporter use from another - **attestation binder** : application-specific value tying evidence to context - **verifier policy** : rule that decides whether evidence is acceptable

Q10: How should the missing-attestation finding be classified

Multiple Choice
**Explanation:** **Question intent:** State the report claim precisely: the risk is policy interpretation, not the existence of empty authenticators. **Terms:** **Missing attestation** means no attestation identity was returned to satisfy policy. **Verified attestation** means the verifier accepted evidence under its policy. **Options:** - A (correct): The application must not collapse no-attestation into attestation success. - B (incorrect): RFC 9261 allows empty authenticators. - C (incorrect): Authenticated refusals are part of the protocol. **Related keywords:** - **missing attestation** : absence of identity evidence needed by policy - **verified attestation** : evidence accepted by the verifier - **RFC violation** : behavior that contradicts the RFC itself