-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data size optimization: Pledge excludes CA cert in DTLS handshake #239
Comments
Email sent to ANIMA WG list: https://mailarchive.ietf.org/arch/msg/anima/H2wqXRp9zPyPilzudXrLkirMvHY/ |
Discussion was done in the ANIMA design team calls earlier:
|
Based on the PR text, it looks like this issue gives rise to some more complexity than originally anticipated. So I would propose to keep such work for the future. For the present I-D we can either 1) not mention this topic at all; or 2) mention that a Manufacturer MAY build a Pledge that suppresses the root CA certificate for the IDevID DTLS handshake but that this only works if the Manufacturer has a business system in place to always deliver the correct IDevID root certs to each customer. (And how this is distributed: out of scope.) |
One proposed optimization of (handshake) data size is the following:
This would save quite some data (100s of bytes).
For the particular case of a promiscuous Registrar that still wants to get more manufacturer info before allowing the Pledge on the network, it can connect via TLS to the MASA URI and it will get the full cert chain of the manufacturer, either public PKI or private PKI based. It can then decide whether to trust it or not.
The text was updated successfully, but these errors were encountered: