[ 
https://issues.apache.org/jira/browse/TS-3216?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14364147#comment-14364147
 ] 

James Peach commented on TS-3216:
---------------------------------

I don't like this approach, for a number of reasons

- It's based on {{ssl_multicert.config}} configuration, so it is not consistent 
with HSTS which is based on {{records.config}}.

- It assumes that there is only 1 backup pin, the backup pin is contained in a 
CSR, and that the CSR is available to ATS. All of these assumptions seem shaky 
to me.

- There are many HPKP options missing (e.g., {{Public-Key-Pins-Report-Only}}, 
{{report-url}}) and it's not clear to me that configuring this in 
{{ssl_multicert.config}} would be a good approach.

- I really would like to avoid adding more knobs to {{ssl_multicert.config}}, 
since it is way to complex already.

> Add HPKP (Public Key Pinning Extension for HTTP) support
> --------------------------------------------------------
>
>                 Key: TS-3216
>                 URL: https://issues.apache.org/jira/browse/TS-3216
>             Project: Traffic Server
>          Issue Type: New Feature
>          Components: SSL
>            Reporter: Masaori Koshiba
>            Assignee: James Peach
>              Labels: review
>             Fix For: 5.3.0
>
>         Attachments: hpkp-001.patch, hpkp-002.patch
>
>
> Add "Public Key Pinning Extension for HTTP" Support in Traffic Server.
> Public Key Pinning Extension for HTTP (draft-ietf-websec-key-pinning-21)
> - https://tools.ietf.org/html/draft-ietf-websec-key-pinning-21



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to