On Thu, Nov 14, 2019 at 4:43 PM Adam Langley <a...@imperialviolet.org>
wrote: People on this list who manage large corporate networks may wish to
pay attention to this: while you may not have updated servers to TLS 1.3
yet, eventually it'll happen and I suspect some will find a significant
amount of things like TPMs, in which you currently have client-certificate
keys, which only sign with PKCS#1 v1.5. Without this draft adopted and
implemented ahead of time, it's going to be painful.

Adam - Wanted to thank you for the call-out to people on the list managing
large corporate networks.  Looking into the mutual authentication supported
protocols issue that you and David raised.  Will evaluate potential future
impact.

Cheers,
Darin

On Thu, Nov 14, 2019 at 4:43 PM Adam Langley <a...@imperialviolet.org> wrote:

> On Mon, Nov 11, 2019 at 11:33 AM Christopher Wood <c...@heapingbits.net>
> wrote:
>
>> The adoption call is now (belatedly) finished. At this time, there's not
>> enough interest to take this on as a WG item. We encourage further
>> discussion on the list, perhaps based on subsequent draft updates, and will
>> revisit adoption in the future if interest grows.
>>
>
> People on this list who manage large corporate networks may wish to pay
> attention to this: while you may not have updated servers to TLS 1.3 yet,
> eventually it'll happen and I suspect some will find a significant amount
> of things like TPMs, in which you currently have client-certificate keys,
> which only sign with PKCS#1 v1.5. Without this draft adopted and
> implemented ahead of time, it's going to be painful.
>
>
> Cheers
>
> AGL
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to