My main concern is to detect anomalies. Blocking in the browser protects
one user. Detecting that there is a problem and reporting it protects
millions.


On Wed, Jan 9, 2013 at 2:40 AM, Leif Johansson <[email protected]> wrote:

>
> > This is something that is easily implemented using a path length
> > constraint but you have to know that there is a potential problem to
> > avoid it.
> >
> Has anyone done interop testing in the wild for path length and name
> constraints, eg
> for commonly deployed TLS stacks and browsers?
>
>             Cheers Leif
> _______________________________________________
> wpkops mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/wpkops
>



-- 
Website: http://hallambaker.com/
_______________________________________________
wpkops mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/wpkops

Reply via email to