On Sat, Jun 27, 2020 at 05:57:45PM -0700, Eric Rescorla wrote:
> On Sat, Jun 27, 2020 at 5:54 PM Toerless Eckert <t...@cs.fau.de> wrote:
> 
> > On Sat, Jun 27, 2020 at 05:18:46PM -0700, Eric Rescorla wrote:
> > > Well, I understand you think you explained it, but unfortunately I don't
> > > find that argument persuasive, nor, I suspect, do others.
> > >
> > > The ACP operator can perfectly well set up mailxobxes if he desires to.
> > > >
> > >
> > > And if ACP required the operators to do so, I think that would also
> > resolve
> > > this issue from an IETF perspective (although you still would likely not
> > be
> > > able to get publicly verifiable certificates for this purpose, at least
> > > from any CA in the Mozilla root program, for the reasons I indicated
> > > previously).
> >
> > FInd the email in the thread where i eplained to Russ how a public CA
> > is useless if not dangerous for what the ACP does right now, but it
> > could be quite useful in future extensons, such as for interdomain
> > auhentication via ACMPE S/MIME.
> >
> > Please understand the use case first before thinking that apply
> > Internet public PKI requirements is always the right think to do.
> >
> 
> I didn't say any such thing. I merely observed that it would not be
> compatible with the requirements those CAs operate under. That's why I put it 
> in
> parentheses.

Thanks.

Cheers
    Toerless

> -Ekr

-- 
---
t...@cs.fau.de

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to