On Fri, Oct 21, 2016 at 8:06 AM, Ilari Liusvaara <ilariliusva...@welho.com> wrote:
> On Fri, Oct 21, 2016 at 08:00:33AM -0700, Eric Rescorla wrote: > > On Fri, Oct 21, 2016 at 7:00 AM, Ilari Liusvaara < > ilariliusva...@welho.com> > > wrote: > > > > > On Fri, Oct 21, 2016 at 04:39:59AM -0700, Eric Rescorla wrote: > > > > On Fri, Oct 21, 2016 at 2:33 AM, Ilari Liusvaara < > > > ilariliusva...@welho.com> > > > > wrote: > > > > > > > > And since that implementation supports RFC7250 (for the server > > > > > certificate), here is my interpretation of it: > > > > > > > > > > The certificate type is sent in extensions of EE certificate, > > > > > via the usual server_certificate_type extension (using the > server-side > > > > > syntax from RFC7250). > > > > > > > > > > > > > I think this probably should go in Encrypted Extensions. > > > > > > It is definitely related to the certificate chain, > > > > > > My argument would be that it doesn't belong in "individual certificates" > > because it applies to certificates as a whole. It's not like it would be > > legal to have a 7250 cert followed by an X.509 cert, one hopes > > Well, there can't be two server certificate "chains". But if there > could, I would expect the type to per-chain. > Sorry, I'm not sure I am following. What I am concerned about is the case where ServerCertificate = [ { Extensions : [ server_certificate_type = RawPublicKey], Certificate : <some SPKI> } , { Extensions : [], Certificate : <some X.509 cert> } ] What is the other side supposed to do with that? -Ekr > > > > -Ilari >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls