Thanks to Ryan and the Chrises for getting this done.

Folks, it seem to us that this working group has done as much as we can for 
this document. We could keep discussing this for another year, but we believe 
at this point this would be counter-productive. 

So, we intend to send this to Barry next week. Please take the time to make 
sure that no huge mistakes have been added in the last two iterations. For your 
convenience, here are links to the diffs:
http://www.ietf.org/rfcdiff?url2=draft-ietf-websec-key-pinning-14
http://www.ietf.org/rfcdiff?url2=draft-ietf-websec-key-pinning-15

Thanks again to the authors and people on the list for all the efforts. I 
believe we have come up with a document that is implementable and adds a 
scalable way to mitigate the threat of mis-issued certificates.

As you know, the journey is not quite done, as we still have AD review, IETF 
last call, the IESG, and the RFC editor. See you all around.

Tobias and Yoav

On Jun 17, 2014, at 2:33 AM, [email protected] wrote:

> 
> A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
> This draft is a work item of the Web Security Working Group of the IETF.
> 
>        Title           : Public Key Pinning Extension for HTTP
>        Authors         : Chris Evans
>                          Chris Palmer
>                          Ryan Sleevi
>       Filename        : draft-ietf-websec-key-pinning-15.txt
>       Pages           : 26
>       Date            : 2014-06-16
> 
> Abstract:
>   This memo describes an extension to the HTTP protocol allowing web
>   host operators to instruct user agents to remember ("pin") the hosts'
>   cryptographic identities for a given period of time.  During that
>   time, UAs will require that the host present a certificate chain
>   including at least one Subject Public Key Info structure whose
>   fingerprint matches one of the pinned fingerprints for that host.  By
>   effectively reducing the number of authorities who can authenticate
>   the domain during the lifetime of the pin, pinning may reduce the
>   incidence of man-in-the-middle attacks due to compromised
>   Certification Authorities.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-websec-key-pinning/
> 
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-websec-key-pinning-15
> 
> A diff from the previous version is available at:
> http://www.ietf.org/rfcdiff?url2=draft-ietf-websec-key-pinning-15
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to