Custom Query (120 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 120)

1 2

Status: closed (100 matches)

Ticket Summary Owner Type Priority Component Version
#74 normative statement of TLS client behavior in Section 3 draft-ietf-trans-rfc6962-bis@… defect blocker rfc6962-bis
#79 Precertificate signature must be over something other than just the TBSCertificate rob.stradling@… defect blocker rfc6962-bis
#85 Precertificate CMS structures MUST be DER rob.stradling@… defect blocker rfc6962-bis
#104 Add SCT Inclusion Proof extension rob.stradling@… defect blocker rfc6962-bis
#41 missing threat model and security analysis draft-ietf-trans-rfc6962-bis@… defect critical rfc6962-bis
#65 remove section 5.4 and reference to "Auditor" in section 3 draft-ietf-trans-rfc6962-bis@… defect critical rfc6962-bis
#73 Section 3 text re log cert validation is ambiguous draft-ietf-trans-rfc6962-bis@… defect critical rfc6962-bis
#140 move section 8 to CA specification rob.stradling@… defect critical rfc6962-bis
#156 Can inclusion proofs properly substitute SCTs? rob.stradling@… defect critical rfc6962-bis
#4 Should we sign TBS for Certificates? rob.stradling@… defect major rfc6962-bis
#5 Add extensions to STH rob.stradling@… defect major rfc6962-bis
#10 Permit Precertificate SCTs to be delivered via OCSP Stapling and the TLS Extension rob.stradling@… defect major rfc6962-bis
#17 Add advice on CNs rob.stradling@… defect major rfc6962-bis
#23 How can TLS clients match an SCT to a certificate? rob.stradling@… defect major rfc6962-bis
#55 Security Considerations: Describe the implications of clients *not* doing certain optional checks draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#57 Clients MUST NOT match the redaction label with a "*" label eranm@… defect major rfc6962-bis
#58 Limit the number of STH's allowed to be published per time unit draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#60 The number of redacted labels should be revealed in the Precertificate rob.stradling@… defect major rfc6962-bis
#62 change title for section 1 draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#63 remove all normative references to client behavior draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#64 remove specification of signature and hash lags from section 2 melinda.shore@… defect major rfc6962-bis
#67 no specification of how a log advertises the max cert chain length it will accept draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#70 SCT spec needs to define top-level extension syntax rob.stradling@… defect major rfc6962-bis
#76 Normative client behavior specified in Section 3.4 melinda.shore@… defect major rfc6962-bis
#77 normative client behavior specified in Section 5 draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#78 algorithm agility discussion is inadequate eranm@… defect major rfc6962-bis
#80 Re-introduce the issuer key hash into the SCT rob.stradling@… defect major rfc6962-bis
#81 OIDs and IANA Considerations rob.stradling@… defect major rfc6962-bis
#82 Add a way to get the SCTs for entries returned by get-entries draft-ietf-trans-rfc6962-bis@… enhancement major rfc6962-bis
#83 CT should mandate the use of deterministic ECDSA melinda.shore@… defect major rfc6962-bis
#86 SCTs should be returned in final format draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#87 Add reference to threat analysis document hadfieldp@… defect major rfc6962-bis
#88 get-entries: "end" should be greater-than-or-equal to "start" draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#89 get-entries: "end" greater than "tree_size" should be allowed draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#91 Clarify encoding of fields in the log client messages eranm@… defect major rfc6962-bis
#92 get-entries needs to return the whole X509ChainEntry rob.stradling@… defect major rfc6962-bis
#93 Monitor description: Inconsistency between intro and section 5.4 melinda.shore@… defect major rfc6962-bis
#94 Fetching of inclusion proofs: Why and when are clients expected to do this? eranm@… defect major rfc6962-bis
#95 Should the response size to get-entries be a part of the log metadata? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#96 Metadata: Should it be dynamic? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#99 Clearer definition of when a certificate is CT-compliant needed melinda.shore@… defect major rfc6962-bis
#102 "root" should be "trust anchor" rob.stradling@… defect major rfc6962-bis
#105 Shrink LogID rob.stradling@… enhancement major rfc6962-bis
#106 Include LogID in the STH structure (TreeHeadSignature) rob.stradling@… task major rfc6962-bis
#107 Struct-ify STH rob.stradling@… enhancement major rfc6962-bis
#108 TLS session resumption: Server MUST NOT send SCTs rob.stradling@… defect major rfc6962-bis
#109 log shutdown timeline and behavior eranm@… defect major rfc6962-bis
#110 Reorganize requirements into appropriate sections rob.stradling@… defect major rfc6962-bis
#115 Verify that recommended consistency checking algorithm is correct katjoyce@… defect major rfc6962-bis
#116 ned definition for mis-issuance draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#118 Monitor function description problem eranm@… defect major rfc6962-bis
#119 confusing wording about log checking in Introduction katjoyce@… defect major rfc6962-bis
#120 public vs. private logs? eranm@… defect major rfc6962-bis
#121 log metadata dissemination draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#122 TLS server requirements draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#123 log clients description too informal, incomplete draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#126 text leaves open the possibility that a submitter might not verify the returned SCT rob.stradling@… defect major rfc6962-bis
#127 confusing case is allowed: submission of pre-cert without embedding SCT in issued cert pphaneuf@… enhancement major rfc6962-bis
#128 section 5 over-claims the properties of an STH draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#129 how do submitters determine what a log will accept? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#131 missing guidance for TLS servers to select logs eranm@… enhancement major rfc6962-bis
#132 unclear motivation for and handling of re-logging entries from a frozen log mhs@… enhancement major rfc6962-bis
#133 incomplete Misbehaving Logs section draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#135 Subjects (vs. Monitors) observing logs? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#136 inconsistent discussion of mis-issued certs and compliance draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#139 move text re: domain labels to CA specification draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#141 expanding audit description eranm@… defect major rfc6962-bis
#142 Specify what TLS clients should send in the extension_data of the transparency_info TLS extension eranm@… defect major rfc6962-bis
#144 Need to specify how the CA requirements in 12.3 are to be met eranm@… defect major rfc6962-bis
#145 Section 9.2 (TLS clients) needs more guidance for browsers eranm@… defect major rfc6962-bis
#153 Finish documenting support for RFC6962 (v1) structures in TransInfo eranm@… defect major rfc6962-bis
#155 Describe how to match SCTs to certificates rob.stradling@… defect major rfc6962-bis
#157 Conflate Version and TransType rob.stradling@… enhancement major rfc6962-bis
#158 Hash algorithm agility is hard to implement, as specified draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#162 Bound the set of artifacts a log is expected to produce eranm@… defect major rfc6962-bis
#163 The entire STH history of the log must be accessible eranm@… defect major rfc6962-bis
#164 Incorporate new protocol mechanisms into TLS Client section eranm@… defect major rfc6962-bis
#165 Remove unnecessary operational restrictions on logs eranm@… defect major to-be-decided
#167 Define "incorporate" eranm@… defect major rfc6962-bis
#168 Remove STH from `get-entries` response draft-ietf-trans-rfc6962-bis@… defect major to-be-decided
#169 Don't guess at STHs draft-ietf-trans-rfc6962-bis@… defect major to-be-decided
#170 Allow for separate SCT and STH keys? eranm@… defect major rfc6962-bis
#171 Simplify Log IDs draft-ietf-trans-rfc6962-bis@… defect major to-be-decided
#172 Pick one structure for multiple TransItems draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#173 De-duplicate Extension types draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#174 Remove use of `digitally-signed`? eranm@… defect major rfc6962-bis
#175 Clarify guarantees around MMD, STH age eranm@… defect major rfc6962-bis
#176 Remove `X509ChainEntry` and `PrecertChainEntryV2` eranm@… defect major rfc6962-bis
#177 Instructions for constructing leaf hash from cert + SCT draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#178 Add description of how to validate an SCT eranm@… defect major rfc6962-bis
#179 Indicate certificate / precertificate in Entry and SCT eranm@… defect major rfc6962-bis
#180 Consolidate all Merkle tree data formats and computations eranm@… defect major rfc6962-bis
#181 Consolidate "Add Chain" and "Add PreCertChain" endpoints eranm@… defect major rfc6962-bis
#182 Clarify notation in the Merkle tree section eranm@… defect major rfc6962-bis
#183 Don't violate the TLS Feature extension definition draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#185 Don't violate BCP 190 eranm@… defect major rfc6962-bis
#188 Specify an empty consistency proof for equal tree sizes draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#189 Permit logs to use EdDSA draft-ietf-trans-rfc6962-bis@… enhancement major rfc6962-bis
#190 Simplify data structures in 6962-bis eranm@… defect major rfc6962-bis
#9 Security Considerations for number and variety of SCTs benl@… defect minor rfc6962-bis
(more results for this group on next page)
1 2
Note: See TracQuery for help on using queries.