I have a few questions/comments about the set of proposed ticket closures:


#37 - Are the gossiping clients discussed by this ticket just Auditors and Monitors, or does it apply to TLS clients as well? Also, if gossiping is addressed in a separate set of docs, does that mean that 6962-bis will make only minimal mention of it? That seems appropriate since until those specs are completed and approved, on cannot attribute
any security features to gossiping, right?

#15 + #38 - For what range of clients is behavior not being specified? My recollection from the IETF meeting was that the discussion focused on TLS clients, not Monitors or Auditors, but the ticket closing comment is not clear on this point. Also, is it useful (vs. confusing) to discuss possible client behaviors in this doc, yet mandate none? I don't recall this issue (what to say about client behavior if we mandate none) being discussed
ion detail on the list.

#40 - I don't recall seeing an explanation by the editors about why they have decided that "stand-along auditing isn't likely to happen." Absent such an explanation, and WG
concurrence, it seems that closing this ticket is premature.

#42 - Since this is a ticket I submitted, let me say that I don't think the
adverb "overly" is appropriate ;-). My concern is that the text didn't provide an algorithmic way to determine when a submitted (pre-)cert with a redacted SAN was "dangerous" and ought not be accepted. Also, the issue was not whether a single entity controls the name space covered by the redacted name; it's whether the CA submitting the pre-cert controls that space. Finally, if we are not specifying how any client (TLS or Monitor) makes use of this feature, why is it part of the spec? Unless we have an agreed-upon set of rules for how to use redacted certs, we are adding complexity to 6962-bis without identifying
any benefits.

#43 - If key rollover is not supported, then the "freeze and begin a new one" process needs to be documented in detail. This description must describe how clients of the old
log become aware of the transition to a new log (to avoid false positives).

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to