On Fri, Nov 14, 2014 at 7:42 PM, Dr. Massimiliano Pala
<massimiliano.p...@gmail.com> wrote:
> (a) Defining new transport protocols for revocation information availability
> (e.g., OCSP over DNS or OCSP over LDAP)

OCSP lacks for various bindings to various transports.  I think
defining more such bindings would be nice.

> (b) (Possibly) defining a more lightweight revocation mechanisms (e.g.
> Lightweight Revocation Tokens)

What would that look like?  I think stapled DANE is about as
light-weight as it's going to get.

> (c) (Possibly) helping other working groups to revise and update how
> revocation information are provided (e.g., the client authentication case)

They can do this themselves.  Assuming TLS 1.3 retains user
authentication with certificates, let the TLS WG add stapled OCSP.

> (d) (Possibly) introducing privacy consideration when it comes to revocation
> checking

If you staple OCSP then the main privacy considerations are:

a) how the end entities' certs and OCSP responses are transported
(e.g., we'd need TLS to have a mode that provides confidentiality to
the client cert, which IIUC is not in the cards for 1.3),

b) how to provide privacy protection for DNS (the elephant in the room).

Anything to be done in TLS belongs squarely in the TLS WG.  I'd love
to see DNS confidentiality, but I think we should get our priorities
straight: opportunistic security, TLS 1.3, CT, DNSSEC/DANE deployment,
...  I confess that my list of priorities is something one could argue
about, and that if we have the energy to do more of these things
concurrently, then we should.

Nico
--

_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to