Rob,

On 29/02/16 19:30, Stephen Kent wrote:
Rob,

I'm not sure what your proposed resolution for this issue means.

Phases like "a suitably name-constrained intermediate cert" and

This phrase is <xref>'d to the section currently numbered 4.3 (Using a Name-Constrained Intermediate CA).

Is that not sufficient?
Sorry. I misunderstood the constrained context of your comment.

"clients may need to used trial and error" are not really appropriate
for a standard. I'll await publication  of the next rev of 6962-bis to
see if there is an algorithmic description of how the matching is to be
performed.

I wrote "MAY need to use trial and error", because a TLS client might guess the correct certificate first time (i.e. without any "error").
Guess? That's not exactly an algorithmic characterization for how an implementer is
supposed to do this, right?
Also, in the (many) cases where there are zero suitably name-constrained intermediates in the chain, the SCT or inclusion proof MUST be valid for the end-entity certificate. No trial and error is required when there is only 1 possible choice!
Agreed, and if the text says this clearly, that will be fine.
The important point is that a TLS client MUST NOT declare that an SCT or inclusion proof is _invalid_ until it has attempted to verify that SCT or inclusion proof against the end-entity cert _and_ against each of the zero or more suitably name-constrained intermediate cert in the certificate chain sent by the TLS server.
Do we need to state this point more explicitly in the document?
I though the focus of this issue was a specification of how a TLS client determines to which cert an SCT applies if the SCT is not embedded in the cert. Looking quickly at
Section 9.2, I still do not see text that specifically addresses this topic.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to