Dirk Meyer wrote:

Alexey Melnikov wrote:
This is quite sensible reminds me of an older IETF effort called
SACRED (see RFC 3767 and friends).
Hello BEEP :)
Indeed :-).

Thanks for the pointer, I will take a look at it to see if something
useful for us is in it.
Good.

I've scanned the document and have some quick comments/questions:
Example 4. Client revokes an X.509 Certificate

<iq type='get'
  from='[EMAIL PROTECTED]/denmark'
  id='revoke'>
<revoke xmlns='urn:xmpp:tmp:saslcert'/>
  <item id='428b1358a286430f628da23fb33ddaf6e474f5c5'>
    <compromised/>
Where is <compromised> defined?
It is part of urn:xmpp:tmp:saslcert (or will be once I write the
schema).

Ok. Please also describe purpose of various revocation reasons in prose.

The problem is that there are two reason to revoke a
certificate:
Yes, I understand that having different revocation reasons is important.

1. A certificate is about to expire. The client uploads a new one and
  revokes the old. The client should stay connected.

2. A device should be removed (e.g. stolen). In that case the
  certificate is compromised and if the device is logged in right now,
  it should be disconnected by the server.

I will write some more doc about this.
Thanks.

Reply via email to