At 3:09 PM +0300 5/11/09, Yaron Sheffer wrote:
>Or possibly:
>
>X.509 Certificate - Signature (4) contains a DER encoded X.509 certificate
>whose public key is used to validate the sender's AUTH payload. With this
>encoding, if a chain of certificates needs to be sent, multiple CERT
>payloads of type 4 MUST be used, the first of which holds the public key
>used to directly validate the sender's AUTH payload. The other CERT payloads
>contain the other components of the chain in natural order, i.e. each
>certificate signing the preceding one.

In a word: no. This is a new requirement on a topic that was vague before.

It should be sufficient for us to say something in 3.6 about multiple CERT 
payloads being acceptable, and probably (but not necessarily) the correct way 
to send a PKIX chain if the party believes that it is needed.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to