Re: [TLS] Consensus on PR 169 - relax certificate list requirements

2015-08-27 Thread Santosh Chokhani
To me it seems that both of these wordings could be interpreted by someone that if you do not have a trust anchor and you get it in the TLS handshake, you can use it and trust it. That sounds dangerous. -Original Message- From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Dave Garrett S

Re: [TLS] Regulations for EKU validation for CA certificates in the certificate chain

2023-01-31 Thread Santosh Chokhani
+1. I almost sent an e-mail largely saying the same over the weekend. Russ’s draft had a flaw which he agreed to fix if there was further interest. And that never came about. I do not exactly remember what the problem was, but I will be happy to review what the authors write to recall if t

Re: [TLS] Proposed changes to draft-ietf-tls-subcerts

2018-07-18 Thread Santosh Chokhani
I do not think you can change an extension syntax or semantic. It is three tuple: extn ID, criticality flag, and value. You can add the syntax and semantics within the extension value as to what it means. That may not help those who do not understand the extension and cannot process the val

[TLS] Re: ML-DSA in TLS

2024-11-16 Thread Santosh Chokhani
+1 -Original Message- From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie] Sent: Friday, November 15, 2024 11:41 AM To: Bas Westerbaan ; tls@ietf.org Subject: [TLS] Re: ML-DSA in TLS On 15/11/2024 10:51, Bas Westerbaan wrote: > We have posted a -00. > > https://datatracker.ietf.or

[TLS] Re: draft-connolly-tls-mlkem-key-agreement

2024-12-12 Thread Santosh Chokhani
FWIW and probably not relevant, DoD CAC has never used DSA. FORTEZZA used DSA. -Original Message- From: Alicja Kario [mailto:hka...@redhat.com] Sent: Monday, December 9, 2024 2:23 PM To: D. J. Bernstein Cc: tls@ietf.org Subject: [TLS] Re: draft-connolly-tls-mlkem-key-agreement On Satur