*3. Log Format and Operation*

This section contains several instances of specified, mandatory behavior for clients, which contradicts the “client behavior is out of scope” assertion, e.g.:

“…since certificates will not be accepted by TLS clients unless logged…”

“TLS clients MUST reject certificates that are not accompanied by an SCT for either the end-entity certificate or for a name-constraine intermediate the end-entity certificate chains to” (this sentence appears to have been truncated, as well as containing a typo.)

The text also says “TLS servers MUST present an SCT from one or more

logs to the TLS client together with the certificate.“ Since there is no specified behavior for clients, I question why mandating behavior for TLS servers is in scope.

“When encountering an SCT, an Auditor …” We’ve told that an auditing is no longer a stand alone function. Looking ahead, Section 5.4, appears to be unchanged since the -03 version, when I noted that it was vacuous.


_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to