On 21/07/16 12:03, Chris Drake wrote:
Hi Yaron,

The premise seems wrong:
These certificates allow the domain owner to terminate the TLS server's 
authorization when necessary,

What that is technically true, it does not facilitate the *purpose* of
the termination (which would be to prevent continued CDN content
distribution) - clients can simply ignore the "expired certificate"
problem and still get the content.

Trying to build a kludge to use certificates where session keys should
be used instead seems a bad-idea(tm) to me.

Kind Regards,
Chris Drake


Hi Chris,

I am not following your reasoning: the CDN can *always* distribute content under a fake or self-signed certificate, even if we have real-time termination of its session keys. After all, it (usually) has a full copy of the content!

Or are you saying that clients behave differently for expired vs. self-signed certs? I am not sure that this is the case.

Thanks,
        Yaron

_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to