To be clear, the client does NOT send its full list of trust anchors by
default. There is a server-side DNS signaling mechanism that allows the
client to pick a single anchor without sending the full set.

The feedback at IETF Vancouver was to move away from a client signals,
server selects (via trust store name and version) to a server signals,
client selects (via OIDs in DNS)

On Sat, Feb 8, 2025 at 3:12 AM Bas Westerbaan <bas=
40cloudflare....@dmarc.ietf.org> wrote:

> Silly clarification: the TAI identifier is just a compact identifier
>> for the root cert, like (making it up) a 4 byte identifier? So the
>> client sends the entire list of root certs supported, so about 100, so
>> 400 bytes?
>>
>> In that case I think you can inject it into an end-entity cert on
>> issuance, and into the root representations in the trust store.
>
>
> Yeah, this is an interesting alternative design. You can reduce the size
> quite a bit more with simple compression techniques. See
>
>   https://github.com/davidben/tls-trust-expressions/issues/64
>   https://github.com/bwesterb/go-ncrlite
>
>
>
>> Where
>> this doesn't work out well is on cross signs where the cert can root
>> to multiple places/when more than one cert is needed to cover and the
>> config only has one, but this would solve a bunch of the issues for
>> command line programs where the trust store format is a bag of certs
>> on disk. It could also work for cross signs since the intermediates
>> used are known by the CA.
>>
>> Sincerely,
>> Watson
>>
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to