Contact emailsdavid...@chromium.org, asymmet...@chromium.org, b...@chromium.org, dadr...@google.com
Explainer https://github.com/davidben/tls-trust-expressions/blob/main/explainer.md Specification https://davidben.github.io/tls-trust-expressions/draft-davidben-tls-trust-expr.html Summary TLS trust expressions are a TLS extension to allow clients to efficiently communicate trusted certification authorities to servers. Servers can then deploy multiple certificates and transparently select between them. This enables a multi-certificate deployment model, for a more agile and flexible PKI that can better meet security requirements. Blink componentInternals>Network>SSL <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL> Motivation Today, TLS servers typically provision a single certificate for all supported clients, because clients do not communicate which CAs are trusted. In this model, the single certificate must simultaneously meet requirements for all relying parties. This constraint imposes costs on the ecosystem as PKIs evolve over time. The older the relying party, the more its requirements may have diverged from newer ones, forcing subscribers to choose between compatibility with new clients, or breaking old clients. This translates to analogous costs for CAs and relying parties: * For a new CA to be usable by subscribers, it must be trusted by all relying parties. This is particularly challenging for older, unupdatable relying parties. Existing CAs face similar challenges when rotating or deploying new keys. * When a relying party must update its policies to meet new security requirements, it must choose between compromising on user security or imposing a significant burden on subscribers that still support older relying parties. Trust expressions remove this constraint, by allowing servers to deploy multiple certificates and transparently select between them. Initial public proposal https://mailarchive.ietf.org/arch/msg/tls/jpVMGyTeYhM8vLTTkteYlxXbh7c/ Search tagstls <https://chromestatus.com/features#tags:tls>, x509 <https://chromestatus.com/features#tags:x509>, certificate <https://chromestatus.com/features#tags:certificate> [The following fields are not actually part of the website's process leading up to generating an I2P email. I've noticed other I2Ps leave them unfilled, so I assume their inclusion in the email is simply a bug in the website. We'll get to those when they show up in the process. See also https://github.com/GoogleChrome/chromium-dashboard/issues/3677 ] TAG reviewNone TAG review statusPending Risks Interoperability and Compatibility None *Gecko*: No signal *WebKit*: No signal *Web developers*: No signals *Other signals*: WebView application risks Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications? None Debuggability None Is this feature fully tested by web-platform-tests <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> ?No https://github.com/web-platform-tests/wpt/issues/20159 Flag name on chrome://flagsNone Finch feature nameNone Non-finch justificationNone Requires code in //chrome?False Estimated milestones No milestones specified Link to entry on the Chrome Platform Status https://chromestatus.com/feature/5096767277498368 This intent message was generated by Chrome Platform Status <https://chromestatus.com/>. -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaDM%3Do9X2pnYHopsr_qCq06NkoNxV%2Bq5u4iW%2BeCKi8%2B1Mg%40mail.gmail.com.