> Precertificates, the same "base" TBSCertificate as the final cert + Poison 
> extension, is signed by the CA

Right. Same end result though: you can not use the CT precertificate to satisfy 
an indirect encryption PoP challenge where the final certificate is the 
challenge text.

---
Mike Ounsworth

From: Spasm <spasm-boun...@ietf.org> On Behalf Of Thom Wiggers
Sent: October 6, 2022 9:06 AM
To: Tomas Gustavsson <tomas.gustavs...@keyfactor.com>
Cc: von Oheimb, David <david.von.ohe...@siemens.com>; u...@ll.mit.edu; 
openssl-us...@openssl.org; morgan...@dataio.com; sp...@ietf.org; tls@ietf.org
Subject: [EXTERNAL] Re: [lamps] [TLS] Q: Creating CSR for encryption-only cert?

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the 
content is safe.
________________________________
Hi Tomas, all,

Good discussion today, I'm learning some new things :D

Op do 6 okt. 2022 om 13:37 schreef Tomas Gustavsson 
<tomas.gustavs...@keyfactor.com<mailto:tomas.gustavs...@keyfactor.com>>:
For CT logs as in 'CT used for public web sites' there is no possibility to 
delay submitting.

Ah, of course it does. I must've been low on coffee when I forgot that the SCT 
is obviously computed through submission to a log, rather than over a promise 
to submit.

I suppose that pretty much rules out the "implicit" challenge-is-encrypted-cert 
method described in CMRF/CMP for web certificates then. Otherwise one might 
spam CT logs?

Cheers and thanks,

Thom
Any email and files/attachments transmitted with it are confidential and are 
intended solely for the use of the individual or entity to whom they are 
addressed. If this message has been sent to you in error, you must not copy, 
distribute or disclose of the information it contains. Please notify Entrust 
immediately and delete the message from your system.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to