On Tue, Feb 27, 2018 at 11:24:31AM -0500, Shumon Huque wrote:
> On Tue, Feb 27, 2018 at 10:59 AM, Shumon Huque <shu...@gmail.com> wrote:
> > Several of us were well aware of this during the early days of the
> > draft, but perhaps many folks did not fully appreciate the impacts
> > until I elaborated on them last year, and added text that described
> > the "adversary with fraudulently obtained PKIX credentials" attack.
> 
> Following up to my own message, sorry ..
> 
> It occurred to me that perhaps a good way to mitigate this risk is
> a combo of mechanisms like CAA and Certificate Transparency logs.

NO.  That's insanely complicated.  A pin-for-X-minutes TTL is trivial.
Let's do this pin-to-DANE thing.

Nico
-- 

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to