> The I-D actually covers this. Understood; the I-D lists a few cons, but arguably none of them are blocking issues. It seems unnecessary to create a new TLS-specific mechanism that duplicates existing PKI semantics.
> Those two serve different purposes. Sometimes you really need the ES/KS > split, sometimes short-lived certs would be more useful. Possibly so. Cheers, Andrei -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: Friday, July 15, 2016 2:14 AM To: Andrei Popov <[email protected]> Cc: Eric Rescorla <[email protected]>; [email protected] Subject: Re: [TLS] draft-rescorla-tls-subcerts On Fri, Jul 15, 2016 at 12:28:18AM +0000, Andrei Popov wrote: > Naïve question: why not simply get a constrained CA certificate and > issue short-validity end entity certs? Unless I’m missing something, > this would work with existing TLS implementations, no extensions > required. The I-D actually covers this. Additionally, I think getting NC certificate is quite expensive/difficult. > Short-lived credential approach seems more viable than > draft-mglt-lurk-tls-requirements-00 (which requires an additional > round-trip between the Edge Server and Content Provider). Those two serve different purposes. Sometimes you really need the ES/KS split, sometimes short-lived certs would be more useful. -Ilari _______________________________________________ TLS mailing list [email protected] https://www.ietf.org/mailman/listinfo/tls
