On Fri, Jun 22, 2018 at 08:48:35PM +, Mike Jones wrote:
> See my note just now proposing this text to Jim:
>
> "Likewise, if PoP keys are used for multiple different kinds of CWTs in an
> application and the PoP keys are identified by Key IDs, care must be taken to
> keep the keys for the
see inline
On Thu, Jun 21, 2018 at 5:58 PM, Jim Schaad wrote:
> I sent this review early by accident (I thought I was sending a different
> mail).
>
>
>
> However a couple things below.
>
>
>
>
>
> *From:* Samuel Erdtman
> *Sent:* Thursday, June 21, 2018 8:15 AM
> *To:* Jim Schaad
> *Cc:*
The sentence I sent was in addition to Hannes language to address the multiple
CWT case discussed in the thread - not a replacement for it.
-- Mike
-Original Message-
From: Jim Schaad
Sent: Saturday, June 23, 2018 9:05 AM
To: Mike Jones ; Hannes
No not really, Hannes's language is much closer to what I am looking for. I
don't care if they are different kinds of CWTs. I care about impersonation.
> -Original Message-
> From: Mike Jones
> Sent: Friday, June 22, 2018 10:44 PM
> To: Jim Schaad ; Hannes Tschofenig
> ;
> -Original Message-
> From: Benjamin Kaduk
> Sent: Friday, June 22, 2018 10:44 PM
> To: Hannes Tschofenig
> Cc: Jim Schaad ; 'Mike Jones'
> ; draft-ietf-ace-cwt-proof-of-
> possess...@ietf.org; ace@ietf.org
> Subject: Re: [Ace] Key IDs ... RE: WGLC on draft-ietf-ace-cwt-proof-of-
>