On Fri, Jul 19, 2024, 8:58 PM Salz, Rich
<rsalz=40akamai....@dmarc.ietf.org> wrote:
>
> I've read it before. I the main issue is that it says "trusted" a lot.
>
>
>
> Yeah, kinda snippy but not necessarily wrong.
>
>
>
> I’m a little skeptical of approaches that solve an entire problem space with 
> one architecture. I’m more skeptical of enough people having the ability to 
> read and understand the semantics of several pages of JSON object 
> descriptions. I know I got MEGO[1] a copule of times while reading it.
>
>
>
> Can we simplify things and solve just one problem?

Do that several times and you end up with the mess we have now, where
the interplay of certificate serving and algorithm selection requires
quite a dance to figure out, and is version dependent. Each additional
factor to negotiate has to play in, and already assembling all the
bits gets complicated.

On top of that if we want the CA ecosystem to evolve, we have to deal
with different clients trusting different things. And there are not a
whole lot of ways to solve that. Using that mechanism to say "here is
the bundle of stuff I expect" is much cleaner.

>
>
>
> For example, in some off-line discuissions others have mentioned that with PQ 
> signatures being so big, there are policy decisions that clients might want 
> to enforce – do you need SCT’s? Do you want OCSP stapling? Maybe it will be 
> worthwhile to just think about what kind hybrid/PQ policies clients will want 
> to express?
>
>
>
> [1] https://www.collinsdictionary.com/dictionary/english/mego
>
>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to