Michael Richardson <[email protected]> wrote:
    > Note: We have three anchors that we might like to deploy.

    > 1) the key that signs the RFC8366/constrained-voucher objects.  Could
    > be a RPK.

    > 2) the key that signs the IDevID certificates in the devices.  Most
    > likely a RFC5280 self-signed certificate, but of course, it's a trust
    > anchor, so likely only the public key matters.

    > 3) the manufacturer could have a CA trust anchor, and #1 and #2 might
    > be provided via subordinate CAs, and only #3 needs to be transfered.
    > (#1 is an EE certificate)

Is there some interest in automating such things?

I think it would be a pretty simple document, with most of the discussion
probably being whether we should allow the user to type in "example.com",
and have it turn that into "https://masa.example.com/.well-known/brski/...";
fetches.  That UI would likely then present a fingerprint to be confirmed.

--
Michael Richardson <[email protected]>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to