Custom Query (176 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 176)

1 2
Ticket Summary Owner Type Priority Milestone Component
#42 redacted cert dangers draft-ietf-trans-rfc6962-bis@… defect blocker rfc6962-bis
#74 normative statement of TLS client behavior in Section 3 draft-ietf-trans-rfc6962-bis@… defect blocker review rfc6962-bis
#79 Precertificate signature must be over something other than just the TBSCertificate rob.stradling@… defect blocker review rfc6962-bis
#85 Precertificate CMS structures MUST be DER rob.stradling@… defect blocker review rfc6962-bis
#104 Add SCT Inclusion Proof extension rob.stradling@… defect blocker review rfc6962-bis
#37 client gossping draft-ietf-trans-rfc6962-bis@… defect critical rfc6962-bis
#40 Auditor behavior draft-ietf-trans-rfc6962-bis@… defect critical rfc6962-bis
#41 missing threat model and security analysis draft-ietf-trans-rfc6962-bis@… defect critical review rfc6962-bis
#65 remove section 5.4 and reference to "Auditor" in section 3 draft-ietf-trans-rfc6962-bis@… defect critical review rfc6962-bis
#73 Section 3 text re log cert validation is ambiguous draft-ietf-trans-rfc6962-bis@… defect critical review rfc6962-bis
#140 move section 8 to CA specification rob.stradling@… defect critical review rfc6962-bis
#156 Can inclusion proofs properly substitute SCTs? rob.stradling@… defect critical review rfc6962-bis
#1 Need options for avoiding logging private subdomains draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#2 Require log submitters to verify SCTs eranm@… defect major rfc6962-bis
#3 TLS clients should audit benl@… defect major rfc6962-bis
#4 Should we sign TBS for Certificates? rob.stradling@… defect major review rfc6962-bis
#5 Add extensions to STH rob.stradling@… defect major review rfc6962-bis
#6 Should we flatten the MerkleTreeLeaf structure? benl@… defect major rfc6962-bis
#7 Clarify error messages from logs eranm@… defect major rfc6962-bis
#10 Permit Precertificate SCTs to be delivered via OCSP Stapling and the TLS Extension rob.stradling@… defect major review rfc6962-bis
#11 get-sth-consistency: Clarify relationship between first and second tree sizes draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#12 Separate versioning schemes for MerkleTreeLeaf and TreeHeadSignature eranm@… defect major rfc6962-bis
#13 Deal with server farm skew benl@… defect major rfc6962-bis
#14 Clarify ASN.1 encoding rob.stradling@… defect major rfc6962-bis
#16 Naming: Decide between 'Audit Path' 'Audit Proof' and 'Inclusion Proof' benl@… defect major rfc6962-bis
#17 Add advice on CNs rob.stradling@… defect major review rfc6962-bis
#18 Name redaction should be non-critical rob.stradling@… defect major rfc6962-bis
#19 Rejig API for efficiency/correctness draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#20 Do we want to be tied to TLS signing algorithms? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#21 Clarify signature checking purpose and mechanism eranm@… defect major rfc6962-bis
#22 Explain why there are three delivery mechanisms for SCTs draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#23 How can TLS clients match an SCT to a certificate? rob.stradling@… defect major review rfc6962-bis
#25 Freezing a log's state draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#26 Precertificates: Find alternative format to X.509 rob.stradling@… defect major rfc6962-bis
#27 Signature & hash alg specification draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#28 Algorithm agility draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#29 what does "immediately" mean? draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#30 Publish MMD as log metadata draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#32 algorithm needed for client checks of SCT draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#33 Cert chain length as log metadata draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#34 use of RFC 5246 syntax to define the SCT draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#36 error indications for log/client exchanges draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#43 key rollover draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#45 Incorporate RFC6962 errata eranm@… defect major rfc6962-bis
#46 Provide explicit instructions for how log servers should handle already-logged certs draft-ietf-trans-rfc6962-bis@… enhancement major milestone1 rfc6962-bis
#47 Clarify how to deal with (minor) DER violations when manipulating a TBSCertificate draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#48 Enforce the rules for Name-constrained Intermediates draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#49 Explain why OCSP Stapling is acceptable but OCSP Fetching is not draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#51 Test, please disregard henrik defect major rfc6962-bis
#54 Simplify name redaction rob.stradling@… enhancement major rfc6962-bis
#55 Security Considerations: Describe the implications of clients *not* doing certain optional checks draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#56 "*" domain labels MUST NOT be redacted rob.stradling@… defect major rfc6962-bis
#57 Clients MUST NOT match the redaction label with a "*" label eranm@… defect major review rfc6962-bis
#58 Limit the number of STH's allowed to be published per time unit draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#59 Clarify STH versioning draft-ietf-trans-rfc6962-bis@… defect major rfc6962-bis
#60 The number of redacted labels should be revealed in the Precertificate rob.stradling@… defect major review rfc6962-bis
#62 change title for section 1 draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#63 remove all normative references to client behavior draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#64 remove specification of signature and hash lags from section 2 melinda.shore@… defect major review rfc6962-bis
#67 no specification of how a log advertises the max cert chain length it will accept draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#70 SCT spec needs to define top-level extension syntax rob.stradling@… defect major review rfc6962-bis
#76 Normative client behavior specified in Section 3.4 melinda.shore@… defect major review rfc6962-bis
#77 normative client behavior specified in Section 5 draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#78 algorithm agility discussion is inadequate eranm@… defect major review rfc6962-bis
#80 Re-introduce the issuer key hash into the SCT rob.stradling@… defect major review rfc6962-bis
#81 OIDs and IANA Considerations rob.stradling@… defect major review rfc6962-bis
#82 Add a way to get the SCTs for entries returned by get-entries draft-ietf-trans-rfc6962-bis@… enhancement major review rfc6962-bis
#83 CT should mandate the use of deterministic ECDSA melinda.shore@… defect major review rfc6962-bis
#86 SCTs should be returned in final format draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#87 Add reference to threat analysis document hadfieldp@… defect major review rfc6962-bis
#88 get-entries: "end" should be greater-than-or-equal to "start" draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#89 get-entries: "end" greater than "tree_size" should be allowed draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#91 Clarify encoding of fields in the log client messages eranm@… defect major review rfc6962-bis
#92 get-entries needs to return the whole X509ChainEntry rob.stradling@… defect major review rfc6962-bis
#93 Monitor description: Inconsistency between intro and section 5.4 melinda.shore@… defect major review rfc6962-bis
#94 Fetching of inclusion proofs: Why and when are clients expected to do this? eranm@… defect major review rfc6962-bis
#95 Should the response size to get-entries be a part of the log metadata? draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#96 Metadata: Should it be dynamic? draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#98 Update gossip-ct for 6962bis draft-ietf-trans-threat-analysis@… defect major gossip
#99 Clearer definition of when a certificate is CT-compliant needed melinda.shore@… defect major review rfc6962-bis
#100 Review in light of blocking draft-ietf-trans-threat-analysis@… defect major gossip
#101 Handle Shutdown Log Case melinda.shore@… defect major gossip
#102 "root" should be "trust anchor" rob.stradling@… defect major review rfc6962-bis
#103 Evaluate if we need tighter requirements around STHs when we take into account multiple logs. linus@… defect major gossip
#105 Shrink LogID rob.stradling@… enhancement major review rfc6962-bis
#106 Include LogID in the STH structure (TreeHeadSignature) rob.stradling@… task major review rfc6962-bis
#107 Struct-ify STH rob.stradling@… enhancement major review rfc6962-bis
#108 TLS session resumption: Server MUST NOT send SCTs rob.stradling@… defect major review rfc6962-bis
#109 log shutdown timeline and behavior eranm@… defect major review rfc6962-bis
#110 Reorganize requirements into appropriate sections rob.stradling@… defect major review rfc6962-bis
#115 Verify that recommended consistency checking algorithm is correct katjoyce@… defect major review rfc6962-bis
#116 ned definition for mis-issuance draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#118 Monitor function description problem eranm@… defect major review rfc6962-bis
#119 confusing wording about log checking in Introduction katjoyce@… defect major review rfc6962-bis
#120 public vs. private logs? eranm@… defect major review rfc6962-bis
#121 log metadata dissemination draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#122 TLS server requirements draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#123 log clients description too informal, incomplete draft-ietf-trans-rfc6962-bis@… defect major review rfc6962-bis
#124 introduction needs work kent@… defect major rfc6962-bis
#126 text leaves open the possibility that a submitter might not verify the returned SCT rob.stradling@… defect major review rfc6962-bis
1 2
Note: See TracQuery for help on using queries.