Hey David,
 
Thanks for the draft! I had some thoughts about how Relying Parties build their 
list of Trust Anchor IDs to send to the Authenticating Parties. In the draft 
currently there is different behaviour by the Relying Party depending on 
whether it is a retry connection or not.
When a relying party receives the tls-trust-anchors in the DNS Service 
Parameter they compute the intersection of the received trust anchors with 
their configured trust anchors, then they use that information to determine 
their trust_anchors list - in this case relying parties should offer multiple 
options.  In the other case, when retrying a connection, relying parties should 
choose a single Trust Anchor ID from the EncryptedExtensions to send.
Could you talk me through your reasoning for the different mechanisms?  I would 
suggest using the same mechanism for calculating the trust_anchors on retry as 
when using the DNS Service Parameter, so the client has consistent behaviour 
and then the authenticating party has the final choice of the certificate chain 
to serve.
Otherwise, the issue described in Section 5.3 of the draft could occur on retry 
with the client picking a trust anchor which includes a certificate in the 
chain it doesn’t support the signature for.

Cheers,
Luke

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to