On 17 apr 2013, at 01:11, Paul Hoffman <[email protected]> wrote:

>> It is not possible to do path validation without having the full trust 
>> anchor certificate,
> 
> Errr, why not? If the client has a certificate that says "the public key of 
> the trust anchor that signed me is keyX", and you get keyX from TLSA, why do 
> you need a full trust anchor certificate?

Sure, I was referring to "IN TLSA 2 x [12]", where only the hash of the 
cert/key is available via DNS.

        jakob

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to