Hi Jim, 

I hope you are well. Thank you again for the valuable input. Please find my 
replies marked with ("--- \n ZA \n---") below. I look forward to your feedback. 

Regards,
Zaid

On 1/9/26, 10:44 AM, "James Galvin" <[email protected] 
<mailto:[email protected]> <mailto:[email protected] 
<mailto:[email protected]>>> wrote:

Speaking as participant:

I have a few comments I would like to make about this document.

First, as a top-level comment, I would like to see this document adopted by the 
working group and then to move forward as a clarification to the EPP 
specification, perhaps as a BCP. I see this as a similar situation to the 
clarification offered regarding the <delete> transform in what became BCP 244 
<https://secure-web.cisco.com/1T2eqz1DF2No6hPq6T17gjlgovezithBIcB2fPck2UAW_6jW0GcZ4M01fIl_7C02rOBKItQMxBx8xlgR_P_e8YkiIyVZK-nV7L1cLEzNPY3ot23j5HWirp8rZj_pJ4gPblx0TpxbkvWExTVmiNcwpyhz-OutUrGfFj4xslDjdUuVcjAB6DZAjsOvyzwglN7bdSb3iqw0CIBjE11eheCFirgBB6b5yMQiVZjGAwPXnXHCN1V9ogBMXjU4l1j35V77Ygc6mgOHLR54ws5fiuKrw9gubbP7eLZak-BeK-u49Ls4/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fbcp244%2F>
 
<https://secure-web.cisco.com/1T2eqz1DF2No6hPq6T17gjlgovezithBIcB2fPck2UAW_6jW0GcZ4M01fIl_7C02rOBKItQMxBx8xlgR_P_e8YkiIyVZK-nV7L1cLEzNPY3ot23j5HWirp8rZj_pJ4gPblx0TpxbkvWExTVmiNcwpyhz-OutUrGfFj4xslDjdUuVcjAB6DZAjsOvyzwglN7bdSb3iqw0CIBjE11eheCFirgBB6b5yMQiVZjGAwPXnXHCN1V9ogBMXjU4l1j35V77Ygc6mgOHLR54ws5fiuKrw9gubbP7eLZak-BeK-u49Ls4/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fbcp244%2F&gt;>
 
<https://secure-web.cisco.com/1T2eqz1DF2No6hPq6T17gjlgovezithBIcB2fPck2UAW_6jW0GcZ4M01fIl_7C02rOBKItQMxBx8xlgR_P_e8YkiIyVZK-nV7L1cLEzNPY3ot23j5HWirp8rZj_pJ4gPblx0TpxbkvWExTVmiNcwpyhz-OutUrGfFj4xslDjdUuVcjAB6DZAjsOvyzwglN7bdSb3iqw0CIBjE11eheCFirgBB6b5yMQiVZjGAwPXnXHCN1V9ogBMXjU4l1j35V77Ygc6mgOHLR54ws5fiuKrw9gubbP7eLZak-BeK-u49Ls4/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fbcp244%2F&gt;>
 
<https://secure-web.cisco.com/1T2eqz1DF2No6hPq6T17gjlgovezithBIcB2fPck2UAW_6jW0GcZ4M01fIl_7C02rOBKItQMxBx8xlgR_P_e8YkiIyVZK-nV7L1cLEzNPY3ot23j5HWirp8rZj_pJ4gPblx0TpxbkvWExTVmiNcwpyhz-OutUrGfFj4xslDjdUuVcjAB6DZAjsOvyzwglN7bdSb3iqw0CIBjE11eheCFirgBB6b5yMQiVZjGAwPXnXHCN1V9ogBMXjU4l1j35V77Ygc6mgOHLR54ws5fiuKrw9gubbP7eLZak-BeK-u49Ls4/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fbcp244%2F&amp;gt;&gt;>
 .

The abstract suggests that the document describes the state of the mTLS client 
authentication mechanism in EPP. I do have a few comments about the details of 
what is in the document noted below, but I think this document and the 
understanding of the EPP specification would be improved if this document 
explicitly said something to the effect that the EPP protocol doesn’t care 
about the extensions of the certificate and thus EPP is not itself impacted by 
the changing policy of the Certificate Authorities (CAs). Thus, it is 
explicitly server policy that defines the certificate requirements and it is 
the responsibility of EPP servers and clients to take care to track changes in 
CA policies.

I believe this is important because if the document is going to describe 
several possible “solutions” to the changing CA policies, it needs to state a 
basis for why any one of several solutions is valid as opposed to choosing 
exactly one. And just to be clear about my position, I’m not opposed to 
choosing one solution, if the working group wants to have that discussion. I do 
have an opinion about which “solution” to choose. However, my starting position 
is that choosing “a solution” is changing EPP and I do not support that. As I 
see it, EPP doesn’t currently care and we should just clarify that, similar to 
how we clarified the <delete> transform.

To be fair, the document seems to suggest this so my comment here is meant to 
reflect an editorial exercise of being explicit. If this were a working group 
document, hence the adoption request above, this is what I would propose.

----
ZA: I found that a common thread in the feedback revolves around the fact EPP 
is independent of the EKU/MTLS changes and changing EPP is not an option.  I 
have added stronger language in the introduction to reflect that. Please see 
the text below and let me know if the point is emphasized enough.  With respect 
to the choosing a "solution", we purposefully focused on presenting feasible 
solutions without addressing which solution is "best" because every environment 
is different and each of these solutions is a small piece of a bigger puzzle. 
The draft aim is to present some options to the current challenge and not 
suggest one option over another. 

"
Recent changes to policies related to Mutual Transport Layer Security
   (mTLS) client certificates are presenting operational challenges for
   the Extensible Provisioning Protocol (EPP) client authentication
   process.  This document describes the changes, the challenges
   associated with these changes, and suggested approaches to continue
   to implement mTLS authentication in EPP.  The solutions addressed are
   not focused on changing EPP, they are focused on options to deal
   satisfying EPP session establishment requirements with currently
   available technologies.
"
----

Aside from that, here’s a few more explicit points for your consideration.

1. In Section 3, the opening phrase of the second paragraph is the key point: 
“While not a requirement of EPP”. I would suggest expanding on the fact that 
EPP does not care about extensions, i.e., it is server policy. The rest of that 
paragraph is noting a change in CA policies; that is background.

----
ZA: In order to reduce the perceived uncertainty factor of the wording in the 
above-mentioned section, the term " While not a requirement of EPP” was 
removed. 
The section now reads as follows:
"
Some server implementations of TLS require that a client certificate
   include the Extended Key Usage (EKU) extension with the id-kp-
   clientAuth key usage purpose (clientAuth EKU), defined in section
   4.2.1.13 of RFC 5280 [RFC5280].  Similarly, some client
   implementations of TLS require that a server certificate include the
   EKU extension with the id-kp-serverAuth key usage purpose (serverAuth
   EKU).  The clientAuth EKU and the serverAuth EKU are registered with
   IANA as described in Section 3.6 of RFC 7299 [RFC7299], for world
   wide web (WWW) client applications and world wide web (WWW) server
   applications, respectively.  There are EKU entries registered for
   other protocols or applications, such as email, SCVP and SSH, but
   none are registered for EPP.
"
----

2. In Section 4, shouldn’t the current state be about the fact that since EPP 
never had extension requirements, EPP server implementations have made their 
own choices based on local implementation needs? The observation is that a 
common choice in local implementation needs may not be available in the future 
because of the changing CA policies. The statement “In practice, EPP clients 
and EPP servers use EKU extensions intended for world wide web applications 
because those certificates have been easy to acquire from popular CAs.” seems 
like an overstatement to me because it suggests, at least to me, that local EPP 
implementations made choices based on WWW applications. While that may be true, 
absent any actual evidence it doesn’t strike me as a relevant technical comment.

-----
ZA: Exactly what evidence would you like to see here? Based on operations data 
this is the situation that some registries are dealing with at the moment. 
-----

3. In Section 5, I’m confused about the distinction and relationship between 
“solutions” and “mechanisms”. I believe the overall issue here is about the 
certificate used and its implementation requirements. So the three “solutions” 
seem reasonable at face value. Specifically, a.) continuing using certificates 
from CAs; b.) EPP server issues its own certificates; c.) self-signed 
certificates. However, I don’t fully understand Section 5.1.1, “solution a”. If 
the point of the solution is to continue using existing CA services, the 
disadvantage is generally the fact that the EPP server and client may be 
impacted by CA policy changes. The client EKU extension is a current example, 
but this description seems to focus only on that and again links the issue to 
WWW applications. It doesn’t address future concerns.

In addition, Section 5.2.1 is confusing because it’s a “mechanism” that is 
inconsistent with “solution a”. The “solution” says to continue to use existing 
CAs and then process the clientAuth EKU. But “mechanism 5.2.1” says use 
existing CAs with certificates that don’t use the clientAuth EKU. Wouldn’t that 
be a “solution” not a “mechanism”?

The other mechanisms seem like implementation details to me, i.e., local 
implementation choices. Since EPP never made a specific choice about 
certificates, I’m not sure these details are necessary. I suppose they are 
informative but as long as the document is not proposing a single solution, I’m 
concerned the “mechanisms” are distracting from the key point that EPP 
implementations that have local needs for certificate requirements should take 
care to track CA policy changes, if appropriate.

------
ZA: The goal behind having a "Mechanism" sub section is to provide high level 
approach to each of the potential solutions. This serves the purpose of 
potentially guiding further discussion on approaches the community find most 
suitable to deploy and the details associated with such approaches. Section 5 
now reads as shows below, and each solution now has a matching potential 
implementation approach. Please let me know if that addresses your point.

"
5.  Potential Solutions With Implementations Guidance
   5.1  Potential Solutions
   5.2  Potential Implementations
"
---------

Thanks,

Jim








On 2 Dec 2025, at 14:39, AlBanna, Zaid wrote:




> Hello,
>
> I hope all is well.
>
> I submitted the draft below. Kindly review and comment. Thanks in advance.
>
> Zaid
>
> On 12/2/25, 2:38 PM, "[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>> <mailto:[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>>> " <[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>> <mailto:[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>>>> wrote:
>
>
> Caution: This email originated from outside the organization. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe.
>
>
> Internet-Draft draft-albanna-regext-eku-mtls-in-epp-00.txt is now available.
>
>
> Title: Extended Key Usage and Mutual TLS in EPP
> Authors: Zaid AlBanna
> James Gould
> Scott Hollenbeck
> Name: draft-albanna-regext-eku-mtls-in-epp-00.txt
> Pages: 10
> Dates: 2025-12-02
>
>
> Abstract:
>
>
> This document describes the state of the Mutual Transport Layer
> Security (mTLS) client authentication mechanism in the Extensible
> Provisioning Protocol (EPP) with respect to a recent change in the
> client certificates published by some Certificate Authorities (CAs).
> The issue is described and options are presented to address the
> operational impact of the change.
>
>
> The IETF datatracker status page for this Internet-Draft is:
> https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F&gt;>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F&gt;>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F&gt;>
>  
> <https://secure-web.cisco.com/1Fn_sSTgAN6EuQflfKpRjHFhw3wsTeC356PoUVEOpwaMY9oCq_eagfdAoUCHhJr_WkhlIONa_P9A9f8YNlSkk26keIBnPuHI6ITsU1Z7e-6ZZ7Uu-5UcOuXqHPntJC4Rk4_3jVRzOX1NPr2sUXK9lvTw_drYvwpGNNIC66Vp7VrwvIOLP67_Gp3KJZRql0Iy7tG_stcIXpZd6tJqlLV_dNgvWFWJVJHvCbY0-sCFZcUJm16RFmyNG6DHaRryO_Z6vQSVJ597OfG0PjiT9HNH4WRKsOLBAZoz3gAaiITx1ct8/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-albanna-regext-eku-mtls-in-epp%2F&amp;gt;&gt;>
>
>
> There is also an HTMLized version available at:
> https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00&gt;>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00&gt;>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00&gt;>
>  
> <https://secure-web.cisco.com/1hrVLgccmsfDoRVjEuc2vUUFcDLH5ZocmaNdNwovEFYadG96W1RfoE2pXpO_D66vcXfvw5mkcTt1OaGb6pIpLjIbbE68aJ7iMupC468jxBGBVPqYzcnKO1ZVs4nwGEXd2ftM3OwiqLh_BcnD5oymsLF6K1zlZtvluw5_aJZl_dSoDBoFK06pcfqwfR4Q2wfKfrXYsLBiRYI3tLPSpdBmYwsQ4Wmb9wPMQO7TzQ-gVtgosW8QXbxppcMXeT1KGBwxiSWih821eADy5ghFeVS_0_yhXQhkVqCXUubnP7iiSVAc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-albanna-regext-eku-mtls-in-epp-00&amp;gt;&gt;>
>
>
> Internet-Drafts are also available by rsync at:
> rsync.ietf.org::internet-drafts
>
>
>
>
> _______________________________________________
> I-D-Announce mailing list -- [email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>> <mailto:[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>>>
> To unsubscribe send an email to [email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>> <mailto:[email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>>>
>
>
>
> _______________________________________________
> regext mailing list -- [email protected] <mailto:[email protected]> 
> <mailto:[email protected] <mailto:[email protected]>>
> To unsubscribe send an email to [email protected] 
> <mailto:[email protected]> <mailto:[email protected] 
> <mailto:[email protected]>>






_______________________________________________
regext mailing list -- [email protected] <mailto:[email protected]>
To unsubscribe send an email to [email protected] 
<mailto:[email protected]>



_______________________________________________
regext mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to