* WGs marked with an * asterisk has had at least one new draft made available during the last 5 days

Trans Status Pages

Public Notary Transparency (Active WG)
Sec Area: Eric Rescorla, Kathleen Moriarty | 2014-Feb-14 —  

IETF-100 trans minutes

Session 2017-11-13 1550-1720: Orchard - Audio stream - trans chatroom


minutes-100-trans-00 minutes

          2017-11-13 15:52:03+0800
          IETF 100
          trans WG
          dkg taking notes
          rsalz jabber scribing
          Question to room: are there objections in the room to Melinda and Paul
          knocking out text to clear AD review for threat analysis draft?
          No objections in the room.
          Linus Nordberg presents about Gossip
          open question about whether we should refactor it.
          Not many people have read the gossip draft.
          6962bis has no editors in the room.
          ekr went through the revised document.  the issues he found should be
          resolvable relatively quickly.
          Diego Lopez presents short-lived certs
          first proposal seems to mix the idea about short-lived certs with
          privacy-focused cert redaction.
          STAR proposal has one long metacertificate which covers a range of
          short-lived certificates.
          This appears to be the moral equivalence of OCSP-must-staple
          ekr+david+rsalz says that the it's unsafe to issue certs with less
          than 1 day because clients clocks are sloppy
          Without this STAR "collapsed cert series" proposal, log size will
          grow, increasing cost to log operators (storage + bandwidth) and log
          monitors (bandwidth).
          Yoav Nir announces discussion about short-term certs Thursday evening.
          Tadahiko Ito (Secom) presents Name Redaction
          motivates the need for this based on IoT devices that do not need full
          web visibility.
          some discussion around whether redaction is hash-based or just
          entirely scrubbed.
          open question about whether geo-information in certificate signed by
          public CA is even possible.
          symantec has issued 2 billion device certificates, to external devices.
          some dispute over whether the use case described actually makes sense
          -- if these are public devices, they should be on the public
          infrastructure.  if they're not, they can use private CAs.
          Ben Schwartz: raises DoS attack on the basis of domain name
          Melinda Shore suggests returning to the CAB Forum
          Hum: should IETF work on name redaction?   some hums for yes, silence
          for no.
          What's going on with the Client Behavior draft?  we need browser
          vendors to supply a draft, but none are volunteering.  Chrome CT folks
          aren't present at all.
          ekr says we should shut down the group if there are no active drafts.

Generated from PyHt script /wg/trans/minutes.pyht Latest update: 24 Oct 2012 16:51 GMT -