Alas, not right now (and here we're in agreement).

However I expect the field to evolve with the threats, and the means for using 
this capability to emerge. IMHO it would be easier to keep this feature waiting 
rather than opening a whole new discussion later on. Plus, by just being there 
it might "stimulate"‎ people to look for ways to use it.

Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network.
  Original Message  
From: David Woodhouse via RT
Sent: Friday, August 7, 2015 11:28
Reply To: r...@openssl.org
Cc: openssl-dev@openssl.org
Subject: Re: [openssl-dev] [openssl.org #3992] [PATCH] Allow RFC6962 Signed     
Certificate Timestamps to be disabled

On Fri, 2015-08-07 at 15:07 +0000, Blumenthal, Uri - 0553 - MITLL
wrote:
> Considering emerging attacks against UEFI I'd be hesitant weakening 
> protection mechanisms, even those that *currently* aren't likely to 
> be used.
‎
Can you suggest a practicable means by which this *could* be used?

-- 
dwmw2



Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to