>    With regard to PKIX certificates, the primary usage is in the
    context of the public key infrastructure described in {{5280}}.
    In addition, technologies such as DNS-Based Authentication
    of Named Entities (DANE) {{RFC6698}} sometimes use certificates based
    on PKIX (more precisely, certificates structured via {{X.509}} or
    specific encodings thereof such as {{X.690}}), at least in certain
    modes.  Alternatively, a TLS peer could issue delegated credentials
    that are based on a CA-issued certificate, as in {{TLS-SUBCERTS}}.
    In both of these cases, a TLS client could learn of a service identity
    through its inclusion in the relevant certificate.  The rules specified
    here are intended to apply whenever service identities are included in
    X.509 certificates or credentials that are derived from such certificates.

s/are intended to// :)
s/are derived from/are derived from, or used to derive/ (subverts is the latter)


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to