I support adoption

I still like the framing I gave in my last email: The current solution to
trust anchor agility is path building / cross-signing. So the question is
whether an incremental improvement on path building is feasible, or if
Something Else is needed. I firmly believe that path building is
unsalvageable. In addition to the interim discussions, this blog post [1]
by Ryan Sleevi was very convincing to me. The TAI draft says that path
building MAY be disabled, I would obviously make this MUST.

1.
https://medium.com/@sleevi_/path-building-vs-path-verifying-the-chain-of-pain-9fbab861d7d6

On Wed, Jan 15, 2025 at 2:11 PM Ryan Hurst <ryan.hu...@gmail.com> wrote:

> As someone with experience building and managing many CAs, running a root
> program, and building out platform technology to enable TLS use cases, I
> believe this work is important and fully support its adoption. Today’s
> manual, out-of-band management of trust anchors not only holds the web back
> but also unnecessarily exposes users to trust anchors that are not
> essential for enabling TLS on the web. This proposal provides a credible
> path to address this lack of agility. While it’s clear that this
> slow-moving and fragile approach is already problematic, it will only
> become more challenging as time goes on. As with all specifications,
> adoption remains the key challenge, but I believe this draft offers a
> practical solution to these issues without disrupting existing systems.
>
> Ryan Hurst
>
> On Wed, Jan 15, 2025 at 8:00 AM Joseph Salowey <j...@salowey.net> wrote:
>
>> At the trust tussle Interim in October we had consensus that the working
>> group was interested in working on the following problem:
>>
>> “Avoid client trust conflicts by enabling servers to reliably and
>> efficiently support clients with diverse trust anchor lists, particularly
>> in larger PKIs where the existing certificate_authorities extension is not
>> viable”
>>
>> After IETF 121, we asked for submissions for possible working group
>> adoption as a starting point for this work. We received two submissions:
>>
>> [1] Trust Anchor Identifiers, draft-beck-tls-trust-anchor-ids-03
>> <https://datatracker.ietf.org/doc/draft-beck-tls-trust-anchor-ids/>
>>
>> [2] Trust is non-negotiable, draft-jackson-tls-trust-is-nonnegotiable-00
>> <https://datatracker.ietf.org/doc/draft-jackson-tls-trust-is-nonnegotiable/>
>>
>> [1] defines a new protocol mechanism, while [2] provides an explanation
>> of why the mechanism in [1] may not be needed and may be problematic. Since
>> the second draft does not define a protocol mechanism we are not
>> considering it for adoption, but we request that working group members
>> review both documents and use [2] as input into determining whether we
>> should adopt [1] as a working group item.  Adoption as a working group item
>> means the working group has change control over and can modify it as
>> necessary; an adopted document is only a starting point.  Please respond to
>> this thread if you think the document should be adopted as a working group
>> item. If you think the document is not appropriate for adoption please
>> indicate why.  This adoption call will close on February 7, 2025.  Also
>> please remember to maintain professional behavior and keep the discussion
>> focused on technical issues.
>>
>>
>> Thanks,
>>
>>
>> Sean, Deirdre and Joe
>>
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to