[prev in list] [next in list] [prev in thread] [next in thread]
List: cap-talk
Subject: Re: [cap-talk] Fwd: [TLS] I-D Action: draft-ietf-tls-oob-pubkey-03.txt
From: Thomas Leonard <talex5 () gmail ! com>
Date: 2015-01-20 10:30:26
Message-ID: CAG4opy9_T3FCOdus7BeWDE4hFVp2T5iafzBf5t3Lhfw2wO8oHg () mail ! gmail ! com
[Download RAW message or body]
On 25 April 2012 at 15:10, Bill Frantz <frantz@pwpconsult.com> wrote:
> A possible path for HTTPSY, the communication layer in E and
> other distributed systems etc.
What's the current status of the httpsy work? The latest mention I
could find is some notes on this wiki page from 2014:
http://iiw.idcommons.net/HTTPSY_%E2%80%93_Leave_the_Certificate_Authority_Behind
But there is no link to an actual spec.
> ====== Forwarded Message ======
> Date: 4/25/12 6:19
> Received: 4/25/12 9:20 -0400
> From: internet-drafts@ietf.org
> To: i-d-announce@ietf.org
> CC: tls@ietf.org
>
> A New Internet-Draft is available from the on-line
> Internet-Drafts directories. This draft is a work item of the
> Transport Layer Security Working Group of the IETF.
>
> Title : TLS Out-of-Band Public Key Validation
> Author(s) : Paul Wouters
> John Gilmore
> Samuel Weiler
> Tero Kivinen
> Hannes Tschofenig
> Filename : draft-ietf-tls-oob-pubkey-03.txt
> Pages : 10
> Date : 2012-04-25
>
> This document specifies a new TLS certificate type for
> exchanging raw
> public keys in Transport Layer Security (TLS) and Datagram Transport
> Layer Security (DTLS) for use with out-of-band public key validation.
> Currently, TLS authentication can only occur via X.509-based Public
> Key Infrastructure (PKI) or OpenPGP certificates. By
> specifying a
> minimum resource for raw public key exchange,
> implementations can use
> alternative public key validation methods.
>
> One such alternative public key valiation method is offered
> by the
> DNS-Based Authentication of Named Entities (DANE) together
> with DNS
> Security. Another alternative is to utilize pre-configured
> keys, as
> is the case with sensors and other embedded devices. The
> usage of
> raw public keys, instead of X.509-based certificates, leads
> to a
> smaller code footprint.
>
> The support for raw public keys is introduced into TLS via a
> new non-
> PKIX certificate type.
>
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-tls-oob-pubkey-03.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> This Internet-Draft can be retrieved at:
> ftp://ftp.ietf.org/internet-drafts/draft-ietf-tls-oob-pubkey-03.txt
>
> The IETF datatracker page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-tls-oob-pubkey/
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
> ====== End Forwarded Message ======
> -------------------------------------------------------------------------
> Bill Frantz | When it comes to the world | Periwinkle
> (408)356-8506 | around us, is there any choice | 16345
> Englewood Ave
> www.pwpconsult.com | but to explore? - Lisa Randall | Los Gatos,
> CA 95032
>
>
> _______________________________________________
> cap-talk mailing list
> cap-talk@mail.eros-os.org
> http://www.eros-os.org/mailman/listinfo/cap-talk
--
Dr Thomas Leonard http://0install.net/
GPG: 9242 9807 C985 3C07 44A6 8B9A AE07 8280 59A5 3CC1
GPG: DA98 25AE CAD0 8975 7CDA BD8E 0713 3F96 CA74 D8BA
_______________________________________________
cap-talk mailing list
cap-talk@mail.eros-os.org
http://www.eros-os.org/mailman/listinfo/cap-talk
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic