Following up to say:

   - This is a TLS launch associated with an IETF draft, not a web platform 
   launch associated with a W3C spec. As such, we are primarily doing the 
   Blink process for visibility.
   - We will follow up with an Intent to Experiment (via Finch, not OT)
   - Since it's not web platform, we don't plan on doing TAG review, etc.

-dadrian
On Tuesday, May 6, 2025 at 5:00:27 PM UTC-4 David Adrian wrote:

> Contact emailsdad...@google.com
>
> Explainer
> https://github.com/tlswg/tls-trust-anchor-ids/blob/main/explainer.md
>
> Specificationhttps://github.com/tlswg/tls-trust-anchor-ids
>
> Summary
>
> Trust Anchor Identifiers (TAI) is a TLS protocol extension that enables a 
> TLS server to efficiently advertise which trust anchors it supports (which 
> roots its certificates chain to), and allows the client to select. It 
> provides a fallback path in case the selection is wrong or otherwise out of 
> date. In addition to enabling multi-certificate use cases, the same Trust 
> Anchor Identifier mechanism can be used to elide intermediate certificates, 
> saving hundreds to thousands of bytes transmitted during the handshake. 
> This work is adopted by the IETF TLS working group. 
>
>
> Blink componentInternals>Network>SSL 
> <https://issues.chromium.org/issues?q=customfield1222907:%22Internals%3ENetwork%3ESSL%22>
>
> Motivation
>
> Enable TLS endpoints to reliably and efficiently present certificates to 
> peers that vary in supported trust anchors, particularly in larger PKIs 
> like the Web PKI. Without a negotiation mechanism, the authenticating party 
> must obtain a single certificate that simultaneously satisfies all relying 
> parties. This is challenging when relying parties are diverse. PKI 
> transitions, including those necessary for user security, naturally lead to 
> relying party diversity, so the result is that service availability 
> conflicts with security and overall PKI evolution. This avoids a conflict 
> between service availability and user security. As authentication 
> requirements evolve to meet user security, the result is increased variance 
> in the ecosystem. If TLS endpoints cannot reliably meet each supported 
> peer's requirements (e.g. because no single certificate satisfies both the 
> oldest and newest supported peers), connections will fail. Often, the 
> result is user security is deprioritized in favor of avoiding any kind of 
> breakage. We approach this by following the standard TLS negotiation 
> pattern. This same approach also enables eliding of intermediate 
> certificates to up to date clients, which reduces the size of the 
> certificate chain transmitted on the wire. This can be a significant amount 
> of bandwidth at scale. 
>
>
> Initial public proposal
> https://github.com/tlswg/tls-trust-anchor-ids/tree/main
>
> Search tagstls <https://chromestatus.com/features#tags:tls>, ssl 
> <https://chromestatus.com/features#tags:ssl>, tai 
> <https://chromestatus.com/features#tags:tai>, tan 
> <https://chromestatus.com/features#tags:tan>, trust anchor identifiers 
> <https://chromestatus.com/features#tags:trust%20anchor%20identifiers>, trust 
> expressions <https://chromestatus.com/features#tags:trust%20expressions>, 
> trust 
> anchor negotiation 
> <https://chromestatus.com/features#tags:trust%20anchor%20negotiation>
>
> TAG reviewNone
>
> TAG review statusPending
>
> Risks
>
>
> Interoperability and Compatibility
>
> None
>
>
> *Gecko*: No signal
>
> *WebKit*: No signal
>
> *Web developers*: No signals
>
> *Other signals*:
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> None
>
>
> Debuggability
>
> None
>
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?No
>
> Flag name on about://flagsNone
>
> Finch feature nameNone
>
> Non-finch justificationNone
>
> Requires code in //chrome?False
>
> Tracking bughttps://bugs.chromium.org/issues/414630735
>
> Launch bughttps://launch.corp.google.com/launch/4382800
>
> Estimated milestones
>
> No milestones specified
>
>
> Link to entry on the Chrome Platform Status
> https://chromestatus.com/feature/5132064512540672?gate=6323389589094400
>
> This intent message was generated by Chrome Platform Status 
> <https://chromestatus.com/>.
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/ce14f910-e9b6-422e-8e79-53d290304222n%40chromium.org.

Reply via email to