Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-10-06 Thread Sean Turner
All, It’s time to put this one to bed. ekr’s going to put back user_mapping for Andrei/MS, but we’re going to ban/orphan the client_authz and server_authz extensions. If it turns out that there’s some need to later unban/unorphan them, then somebody can write a draft that specifies how they’r

Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-09-06 Thread Russ Housley
I agree that client_authz and server_authz have not enjoyed much implementation. Russ On Sep 3, 2016, at 3:54 PM, Eric Rescorla wrote: > https://github.com/tlswg/tls13-spec/pull/624 > > We currently have code points assigned for > > user_mapping [RFC4681] > client_authz [RFC5878]

Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-09-03 Thread Andrei Popov
Yes, I think so. Cheers, Andrei From: Eric Rescorla [mailto:e...@rtfm.com] Sent: Saturday, September 3, 2016 4:07 PM To: Andrei Popov Cc: tls@ietf.org Subject: Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3 Thanks for flagging this. Looks like it can just go right before Certificate

Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-09-03 Thread Eric Rescorla
omain users). We do not implement client/server_authz. > > > > Cheers, > > > > Andrei > > > > *From:* TLS [mailto:tls-boun...@ietf.org] *On Behalf Of *Eric Rescorla > *Sent:* Saturday, September 3, 2016 12:54 PM > *To:* tls@ietf.org > *Subject:* [TLS] PR #6

Re: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-09-03 Thread Andrei Popov
: [TLS] PR #624: Remove Supplemental Auth from TLS 1.3 https://github.com/tlswg/tls13-spec/pull/624 We currently have code points assigned for user_mapping [RFC4681] client_authz [RFC5878] server_authz [RFC5878] These aren't well-specified for use in TLS 1.3 and my sense is that they are b

[TLS] PR #624: Remove Supplemental Auth from TLS 1.3

2016-09-03 Thread Eric Rescorla
https://github.com/tlswg/tls13-spec/pull/624 We currently have code points assigned for user_mapping [RFC4681] client_authz [RFC5878] server_authz [RFC5878] These aren't well-specified for use in TLS 1.3 and my sense is that they are barely used. Any objections to just banning them? If not, I