> Finally, the WG could decide that servers which publish U/S/M
> combinations in their TLSA RRset that contain only future or only
> past keys are "misconfigured", and that servers SHOULD NOT do that.
I don't understand how any crypto protocol can succeed when it
authenticates only past or future keys, not the keys in present use.
Can you explain why you think such a server is NOT misconfigured? Or
perhaps you will agree that this is misconfiguration, but you think
that for some reason that you can state, many people will foolishly
misconfigure their servers this way, such that the protocol should
gracefully handle that "common misconfiguration" case?
Struggling to understand,
John
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane