Hi all,

Thanks everyone for a very productive interim! It was nice to see the
interest in solving this problem, and to hear from the experiences of folks
in the TLS ecosystem. While we client folks may try our best to anticipate
the needs of server operators, there’s really no substitute for hearing
from you all directly.

We’ve recently published draft-beck-tls-trust-anchor-ids-02:

URL:
https://www.ietf.org/archive/id/draft-beck-tls-trust-anchor-ids-02.txt

Status:   https://datatracker.ietf.org/doc/draft-beck-tls-trust-anchor-ids/

HTML:
https://www.ietf.org/archive/id/draft-beck-tls-trust-anchor-ids-02.html

It’s been a while since we’d last mailed about this, so I’ll describe the
changes since -00:

* For convenience, -00 referenced sections of
draft-davidben-tls-trust-exprs, as they both targeted the same problem
statement. Based on the feedback in Vancouver, we are focusing on
draft-beck-tls-trust-anchor-ids and have reworked the document to stand on
its own.

* We’ve added a bit more discussion under Security Considerations, to
further discuss how this work interacts with how PKIs are used in TLS.

* We’ve switched the term “subscriber” to “authenticating party”, for the
role that presents a certificate. “Subscriber” came from the CA/B Forum
Baseline Requirements, where it describes the subscriber or applicant to a
CA’s services. While that does identify this role, it is a little odd in a
document more focused on the TLS client <-> TLS server relationship than
the subscriber <-> CA relationship.

We hope these changes will make the draft easier to understand and invite
you all to take another look. We think it serves as a good starting point
for the working group to build on, and think it is ready to consider for
adoption.

David, Devon, and Bob
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to