-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated Abstract #12
base: main
Are you sure you want to change the base?
Updated Abstract #12
Conversation
Based on feedback from Matthijs van Duin I have updated the abstract to better describe the goal of this specification.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Rest of changes look good.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes look okay for me. I only added smaller proposal to enhance the statement regarding cryptographic parameter negotiation.
I know, we do not provide that certificate update option in the ExtendedKeyUpdate, but I thought it would be good to point to that capability in TLS 1.2
application traffic secrets after the initial handshake. | ||
|
||
Earlier versions of TLS supported renegotiation, a mechanism that allowed peers to | ||
establish new cryptographic parameters within an existing session. However, due to |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe to add, session renegotiation did not only allow to establish new cryptographic parameter for the sesssion, it also allowed to utilized an updated long term credential (certificate). This adresses cases, were the initially used long term credential may have reached the validity end or may have been revoked in the meantime.
Proposal to change the sentence to:
Earlier versions of TLS supported session renegotiation, a mechanism that allowed peers to
establish new cryptographic parameters within an existing session including the potential update of the initially utilized long term keys (certificates) with renewed credentials.
Based on feedback from Matthijs van Duin I have updated the abstract to better describe the goal of this specification.