>
> Silly clarification: the TAI identifier is just a compact identifier
> for the root cert, like (making it up) a 4 byte identifier? So the
> client sends the entire list of root certs supported, so about 100, so
> 400 bytes?
>
> In that case I think you can inject it into an end-entity cert on
> issuance, and into the root representations in the trust store.


Yeah, this is an interesting alternative design. You can reduce the size
quite a bit more with simple compression techniques. See

  https://github.com/davidben/tls-trust-expressions/issues/64
  https://github.com/bwesterb/go-ncrlite



> Where
> this doesn't work out well is on cross signs where the cert can root
> to multiple places/when more than one cert is needed to cover and the
> config only has one, but this would solve a bunch of the issues for
> command line programs where the trust store format is a bag of certs
> on disk. It could also work for cross signs since the intermediates
> used are known by the CA.
>
> Sincerely,
> Watson
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to