On Wed 2016-03-30 11:22:15 -0400, Eric Rescorla wrote:
> This got a lot of discussion early in the design process and the consensus
> was that the risk of having the default mode (with existing certs) allow the
> creation of a long-term delegation was too high. See, for instance, the
> relative impact of the recent paper by Jager at al. [0] on TLS 1.3 and
> QUIC.
>
> With that said, I think this would be a good feature to look at in future
> and the right way to do it is to:
>
> 1. Add a "this is only usable for TLS 1.3 [or for subcerts]" extension to
> PKIX.

this would need to be a critical extension, since the goal is to have it
be unusable by existing endpoints, right?  do we have tests about how
well existing endpoints will fail closed in the face of unknown critical
extensions?

> 2. Add a subcert extension to TLS 1.3.

This would be necessary for clients to signal that it's ok to use such a
delegated cert or subcert.  we need to think clearly about how to limit
the scope of such a delegation to make it safe.

          --dkg

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to