Hi Daniel,

On 18/04/2017 17:15, Daniel Margolis wrote:
On Thu, Apr 6, 2017 at 11:08 AM, <[email protected] <mailto:[email protected]>> wrote:

    _ Section 3.3 HTTPS Policy Fetching

    "When fetching a new policy or updating a policy, the HTTPS endpoint

    MUST present a X.509 certificate which is valid for the "mta-sts"

    host (as described in [RFC6125]), chain to a root CA that is trusted

    by the sending MTA, and be non-expired."

     Maybe it's redundant, but since it explicitly mention non-expired,

    should it also mention not revocated?


Do relevant RFCs for HTTPS specify CRL/OCSP checking? If not--and in practice it varies by implementation, such that some major browsers do not implement one or the other--I would not want to mandate it here, even if it's a good idea.

(And I agree it's a good idea in the abstract, but to my very limited knowledge, the state of deployment is haphazard, so it seems a bit risky to require it.)

RFC 5280 mention it. I think you need to make it clear that checking OCSP is not prohibited here. (Maybe say "MAY use OCSP to check for revocation" or similar.)

Best Regards,
Alexey


_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to