For a Web GUI with the user at the console (e.g., a Web browser), it might be 
OK. 

For my needs (devices talking to each other over austere links), sending the 
root CA very is both useless and wasteful. One you factor in the sizes of 
Post-Quantum keys and signatures - you’ll start disliking this idea even more. 

Regards,
Uri

> On Mar 31, 2021, at 13:49, Viktor Dukhovni <openssl-us...@dukhovni.org> wrote:
> 
> 
>> 
>> On Mar 31, 2021, at 1:43 PM, Michael Wojcik <michael.woj...@microfocus.com> 
>> wrote:
>> 
>> As far as I can see, neither PKIX (RFC 5280) nor the CA/BF Baseline 
>> Requirements say anything about the practice, though I may have missed 
>> something. I had a vague memory that some standard or "best practice" 
>> guideline somewhere said the server should send the chain up to but not 
>> including the root, but I don't know what that might have been.
> 
> Inclusion of the self-signed root is harmless.  The only case that
> I know of where this is actually necessary is with DANE-TA(2) when
> the TLSA RRset has a hash of the trusted root cert or public key.
> 
> -- 
>    Viktor.
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to