Inline...

On 7/20/22, 8:55 PM, "RATS on behalf of Michael Richardson" 
<[email protected] on behalf of [email protected]> wrote:

<snip>

    }   Any
    }   public key that can be used to verify a certificate is assumed to
    }   also support verification of revocation information, subject to
    }   applicable constraints defined by the revocation mechanism.

    I feel as Geoff Houston does: revocation is useless security theatre.

[CW] OK but there does still exist revocation information that some people 
verify, perhaps theatrically.

    } An unsigned concise TA stores object is a list of one or more TA
    } stores, each represented below as a concise-ta-store-map element.

    Seems like maybe a word is missing here.
    Not really sure.  It is really hard to read.
    Is: _unsigned concise TA stores object_ the name of a thing?
    I think so, but maybe it could be reworded.

[CW] The wording could be better. It's referring to the concise-ta-stores 
object. Maybe it should just say that.

        >     Why does the Enterprise trust the attestation key?

    I'm unclear from a quick reading the document if there are signed TA stores.
    I think so based upon the examples.

[CW] Yes. This uses the signing mechanism from CoRIM, i.e., COSE. There is an 
example with a signature, but it's only given in base64 (not JSON). That one 
should probably be expanded too.

    --
    Michael Richardson <[email protected]>, Sandelman Software Works
     -= IPv6 IoT consulting =-



    _______________________________________________
    RATS mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/rats


_______________________________________________
Acme mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/acme

Reply via email to