On Mon, 20 Oct 2014, Linus Nordberg wrote:

as individual without chair hat...

  Logs MUST verify that the submitted end-entity certificate or

My intention was to make the specification less restrictive by changing

                              Logs MAY accept certificates that have
  expired, are not yet valid, have been revoked, or are otherwise not
  fully valid according to X.509 verification rules in order to
  accommodate quirks of CA certificate-issuing software.

That seems to bring up the topic a bit too broadly I think? How about:

        Logs MUST protect themselves against spam. They MAY require a
        fully validated X.509 certification chain to one of their configured
        trusted root CA's.

That leaves out the discussion for other checks, that may or may not go
into a separate section or document.

Paul

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to