> IIRC, this is one of the main arguments for advancing Roughtime: I took a look at draft 06. I don't see how it helps. Am I missing something?
Here is the key section: 6.4 Validity of Response A client MUST check the following properties when it receives a response. We assume the long-term server public key is known to the client through other means. If I can distribute valid long-term keys, I can use them to sign the certificates for NTS-KE servers and don't need Roughtime to get started. -- These are my opinions. I hate spam. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls