On Thu, Jun 4, 2020 at 9:48 PM Sean Turner <s...@sn3rd.com> wrote: > > Another reminder ... > > > On May 22, 2020, at 09:23, Sean Turner <s...@sn3rd.com> wrote: > > > > This is the 3rd WGLC for "Exported Authenticators in TLS" draft available > > at https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/. > > The secdir review during IETF LC raised some issues and as a result there > > have been a couple of new versions. Please respond to the list with any > > comments by 2359 UTC on 8 June 2020.
I've implemented earlier drafts. I do have a concern with the validate API as presented in the draft: it treats empty authenticators as valid, and then returns the identity as a certificate chain that must be validated by the application. Similar APIs have lead to easily foreseeable pwnage. Instead I would recommend the validate API carry out X509 validation against a trust store or validation function and treat the empty authenticator as invalid. That way someone has to think before not checking the certificate returned. Sincerely, Watson Ladd _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls