> > Silly clarification: the TAI identifier is just a compact identifier > for the root cert, like (making it up) a 4 byte identifier? So the > client sends the entire list of root certs supported, so about 100, so > 400 bytes? > > In that case I think you can inject it into an end-entity cert on > issuance, and into the root representations in the trust store.
Yeah, this is an interesting alternative design. You can reduce the size quite a bit more with simple compression techniques. See https://github.com/davidben/tls-trust-expressions/issues/64 https://github.com/bwesterb/go-ncrlite > Where > this doesn't work out well is on cross signs where the cert can root > to multiple places/when more than one cert is needed to cover and the > config only has one, but this would solve a bunch of the issues for > command line programs where the trust store format is a bag of certs > on disk. It could also work for cross signs since the intermediates > used are known by the CA. > > Sincerely, > Watson > > _______________________________________________ > TLS mailing list -- tls@ietf.org > To unsubscribe send an email to tls-le...@ietf.org >
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org