Re: [TLS] Abridged Certificate Compression (dictionary versioning)

2023-07-14 Thread Dennis Jackson
On 13/07/2023 02:31, Kampanakis, Panos wrote: Btw, in 3.1.1 I noticed - "Remove all intermediate certificates which are not signed by root certificates still in the listing." That could eliminate some 2+ ICA cert chains. Any reason why? Whoops, that's a good spot. The intent here was just to r

Re: [TLS] Abridged Certificate Compression (dictionary versioning)

2023-07-13 Thread Tim Hollebeek
nakis, Panos > Sent: Wednesday, July 12, 2023 9:31 PM > To: Dennis Jackson ; TLS List > > Subject: Re: [TLS] Abridged Certificate Compression (dictionary versioning) > > I wish there was a study of the certs issued by newly introduced CAs in CCADB > and how quickly they ramp up

Re: [TLS] Abridged Certificate Compression (dictionary versioning)

2023-07-12 Thread Kampanakis, Panos
reason why? -Original Message- From: Dennis Jackson Sent: Wednesday, July 12, 2023 1:01 PM To: Kampanakis, Panos ; TLS List Subject: RE: [EXTERNAL][TLS] Abridged Certificate Compression (dictionary versioning) CAUTION: This email originated from outside of the organization. Do not cl

Re: [TLS] Abridged Certificate Compression (dictionary versioning)

2023-07-12 Thread Dennis Jackson
On 12/07/2023 04:54, Kampanakis, Panos wrote: Hi Dennis, Appendix B.1 talks about 100-200 new ICA and 10 Root certs per year. In the past I had looked at fluctuations of CCADB and there are daily changes. When checking in the past, I did not generate the ordered list as per pass 1 on a daily

[TLS] Abridged Certificate Compression (dictionary versioning)

2023-07-11 Thread Kampanakis, Panos
Hi Dennis, Spinning up a new thread since this is a different topic. Section 5.1 talks about the dictionary versioning approach and suggests an annual cadence is enough. The issue of an up-to-date cache was a big concern for the ICA Suppression draft, and rightfully so. A stale dictionary doe