Hi!

This message closes out the 3rd WGLC for 
draft-ietf-tls-exported-authenticators. I have created GH issues for the two 
issues raised during WGLC:
https://github.com/tlswg/tls-exported-authenticator/issues/62
https://github.com/tlswg/tls-exported-authenticator/issues/63
Once addressed, and assuming the changes are not large, we will progress this 
draft towards our AD.

I will put the draft in Waiting for WG Chair Go-Ahead / Revised I-D needed 
awaiting resolution of the two issues.

spt (for the chairs)

> On Jun 5, 2020, at 07:29, Watson Ladd <watsonbl...@gmail.com> wrote:
> 
> On Thu, Jun 4, 2020 at 9:48 PM Sean Turner <s...@sn3rd.com> wrote:
>> 
>> Another reminder ...
>> 
>>> On May 22, 2020, at 09:23, Sean Turner <s...@sn3rd.com> wrote:
>>> 
>>> This is the 3rd WGLC for "Exported Authenticators in TLS" draft available 
>>> at https://datatracker.ietf.org/doc/draft-ietf-tls-exported-authenticator/. 
>>> The secdir review during IETF LC raised some issues and as a result there 
>>> have been a couple of new versions. Please respond to the list with any 
>>> comments by 2359 UTC on 8 June 2020.
> 
> I've implemented earlier drafts. I do have a concern with the
> validate API as presented in the draft: it treats empty authenticators
> as valid, and then returns the identity as a certificate chain that
> must be validated by the application. Similar APIs have lead to easily
> foreseeable pwnage. Instead I would recommend the validate API carry
> out X509 validation against a trust store or validation function and
> treat the empty authenticator as invalid. That way someone has to
> think before not checking the certificate returned.
> 
> Sincerely,
> Watson Ladd

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to