On Fri, Jul 20, 2018 at 06:41:14PM +0000, Patton,Christopher J wrote:
> 
> Thus, I believe the only valid configurations are:

Sanity check: If DC is not used, then either all clients accept, or all
clients reject.

>   *   strict=true, crit=true;

Both reject. Satistifes the check.

>   *   strict=false, crit=true; and

Clients that support DC accept, clients that do not support DC
reject. This fails the check above.

>   *   strict=false, crit=false.

Both accept. Satisfies the check.

(The fourth, strict=true, crit=false, would also fail the check).


Actually, what usecase do strict certificates serve anyway? I can not
figure out any usecase that would make much sense to me. Dealing with
server endpoints that are capable of LURK but not proof-of-possession
nor is the keyserver capable of format-checking?

The usecase for the X.509 extension to signal support is to signal
the service the needed infrastructure for delegating subcertificates
(including having LURK as standby).


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to