On 03.12.2019 15:39, volga629 via Users wrote:
Thank you reply, so any bad actor can't use as example with self sign certificates ?   So digital signature must be produced from well known authorized CA certificate key pair ?
Correct.  The bad actor's self-signed X509 STIR/SHAKEN certificate can be easily
distinguished from an officially recognized one (exactly like HTTPS certs).

Can you point on one of the well know CA authority which authorized for SHAKEN/STIR.

volga629
The last known info I have is this [1] "call for certification authorities", back in July.  I'm not sure whether the deadline is over, or if any CAs have started popping up,
but from what I just searched, things haven't progressed much.

Regards,

[1]: https://sites.atis.org/insights/sti-ga-call-for-certificate-authorities/

Liviu Chircu
OpenSIPS Developer
http://www.opensips-solutions.com

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to