> On May 23, 2022, at 12:33, Martin Duke via Datatracker <nore...@ietf.org> 
> wrote:
> 
> Martin Duke has entered the following ballot position for
> draft-ietf-tls-subcerts-14: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-tls-subcerts/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> A question to remedy by ignorance of ASN.1:
> 
> How customary is it for the final standard to use an ASN.1 codepoint from
> Cloudflare's private namespace? In other contexts I would expect change 
> control
> to lie with a more public institution.
> 
> Put another way, what would happen if Cloudflare were purchased by EvilCorp 
> one
> day?

I believe the WG did discuss switching the OID to the PKIX arc, but an OID is 
like you age - it’s just a number. Once assigned, nobody can really take it 
back. As far as common, it happens - I am hesitant to say all the time, but it 
is not uncommon. There are OIDs for modules, extensions, and algorithms out of 
company arcs and gov’t arcs. E.g.,

Digest algorithms: SHA*-> Gov’t
x25519, x448, Ed25519, Ed448 (RFC 8410) -> Thwate arc.
TAMP (RFC 5934) -> Gov’t Arc.

I am sure there are more.

spt




_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to