On Aug 10, 2007, at 12:47 PM, Stephen Farrell wrote:

You seem to prefer that this work be scoped so as to be limited
to x.509 TAs only.

I'm just wondering if you see any specific benefit to that, or
if its just that you've not seen specific enough reasons to want
to support more than x.509?

(From my p-o-v, I guess I'd argue that any TA related work starting
in 2008 shouldn't only support x.509.)

I'm involved in this because I see a value for it for what I do with X.509. But I also need it for OpenPGP, as well.

Well, maybe not *need*. One of the things about OpenPGP is that it has a number of quasi-standard, ad-hoc ways to do a lot of things. I mean "quasi-standard" that we all do it the same way, and there's no document describing that way.

Also, OpenPGP has always had the notion that roots are in the eye of the beholder, and any certificate can be a root.

However, it would be very, very useful to have TAM specify how to push trust points around. It fills a huge gap in the documentation of how the larger world works.

My first observation to the draft-00 was to ask if it was PKIX- specific. The answer then was that it's not. That's great, to me. I want this for other certificate types, most specifically OpenPGP. I have been broader than that because I know people building systems and considering using SPKI, and they would need this, too, or have to develop their own, ad-hoc way of doing it.

        Jon

--
Jon Callas
CTO, CSO
PGP Corporation         Tel: +1 (650) 319-9016
3460 West Bayshore      Fax: +1 (650) 319-9001
Palo Alto, CA 94303     PGP: ed15 5bdf cd41 adfc 00f3
USA                          28b6 52bf 5a46 bc98 e63d



Reply via email to