comparison with other stored security state mechanisms [was: Re: Sharing Trust Policy between Crypto Libraries]
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Thu Jan 3 15:08:54 PST 2013
On 12/20/2012 12:38 PM, Stef Walter wrote:
> http://p11-glue.freedesktop.org/doc/sharing-trust-policy/
In addition to the list of alternate extension mechanisms reviewed in
this document, It might be useful to compare chromium's internal
blacklist/security state mechanism:
https://src.chromium.org/viewvc/chrome/trunk/src/net/base/transport_security_state_static.json
This is related to (among other things) the "key pinning" concept
currently advanced in the websec working group:
https://tools.ietf.org/html/draft-ietf-websec-key-pinning
(see also my recent e-mail on this list 'Different meanings of "Pinning"?').
Similarly to websec-key-pinning, HSTS and TACK are examples of per-peer
secure communications policy that would ideally be shared across
applications:
HSTS:
https://tools.ietf.org/html/rfc6797
TACK:
http://tack.io
https://tools.ietf.org/html/draft-perrin-tls-tack
I don't think the current draft can support any of these mechanisms, and
perhaps they're out of scope; but maybe there are parts of them that
shouldn't be out of scope?
--dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1027 bytes
Desc: OpenPGP digital signature
URL: <http://lists.freedesktop.org/archives/p11-glue/attachments/20130103/4edc1f64/attachment.pgp>
More information about the p11-glue
mailing list