Timeline


and

02/02/16:

21:05 Ticket #138 (use of term before defining it) closed by melinda.shore@…
fixed
21:05 Ticket #127 (confusing case is allowed: submission of pre-cert without embedding ...) closed by melinda.shore@…
fixed
21:04 Ticket #133 (incomplete Misbehaving Logs section) closed by melinda.shore@…
fixed
21:04 Ticket #126 (text leaves open the possibility that a submitter might not verify the ...) closed by melinda.shore@…
fixed
21:00 Ticket #120 (public vs. private logs?) closed by melinda.shore@…
fixed
20:59 Ticket #119 (confusing wording about log checking in Introduction) closed by melinda.shore@…
fixed
20:58 Ticket #108 (TLS session resumption: Server MUST NOT send SCTs) closed by melinda.shore@…
fixed
20:57 Ticket #97 (Allocate an OID for CMS precertificates) closed by melinda.shore@…
fixed
20:56 Ticket #94 (Fetching of inclusion proofs: Why and when are clients expected to do this?) closed by melinda.shore@…
fixed
20:56 Ticket #87 (Add reference to threat analysis document) closed by melinda.shore@…
fixed
20:56 Ticket #78 (algorithm agility discussion is inadequate) closed by melinda.shore@…
fixed
20:55 Ticket #140 (move section 8 to CA specification) closed by melinda.shore@…
fixed: Agreed that the additional material should be in a different document.

01/02/16:

16:56 Ticket #150 (Architecture document: Indicate missing SCT is equivalent to invalid one) closed by eranm@…
invalid: Fair enough.
15:24 Ticket #115 (Verify that recommended consistency checking algorithm is correct) reopened by katjoyce@…
15:19 Ticket #153 (Finish documenting support for RFC6962 (v1) structures in TransInfo) created by rob.stradling@…
"Appendix A. TransItemV1 TODO: Finish writing this section. Or …
12:11 Ticket #115 (Verify that recommended consistency checking algorithm is correct) closed by katjoyce@…
fixed
11:48 Ticket #95 (Should the response size to get-entries be a part of the log metadata?) closed by paul@…
wontfix

28/01/16:

18:22 Ticket #129 (how do submitters determine what a log will accept?) closed by melinda.shore@…
duplicate

20/01/16:

15:03 Ticket #102 ("root" should be "trust anchor") closed by melinda.shore@…
fixed
14:59 Ticket #114 (Name the OCSP Stapling TLS extension correctly) closed by melinda.shore@…
fixed
08:57 Ticket #102 ("root" should be "trust anchor") reopened by rob.stradling@…
Sorry, I referenced the wrong commit. This ticket was actually fixed …
06:54 Ticket #147 (definition of mis-issuance, still!) closed by melinda.shore@…
duplicate: Duplicate of ticket:71

19/01/16:

20:41 Ticket #102 ("root" should be "trust anchor") closed by melinda.shore@…
fixed

08/01/16:

17:11 Ticket #152 (Architecture document: CT-aware TLS clients may require SCTs for all certs) created by eranm@…
(Towards the end of Page 14) Concludes that because real-time …
17:07 Ticket #151 (Architecture document: Only the leaf cert + timestamp are in the SCT) created by eranm@…
In section 3.1: The sentence saying "hashing it with information from …
17:02 Ticket #150 (Architecture document: Indicate missing SCT is equivalent to invalid one) created by eranm@…
In section 2, in the part about TLS clients (browsers), append "or …
16:59 Ticket #149 (Architecture document: Figure 1: Finer-grained distinction between entities) created by eranm@…
In Figure 1, there's a very good distinction between "defined by CT" / …
16:55 Ticket #148 (Architecture document: Spelling/improvements to Introduction) created by eranm@…
In section 1: onlogs -> on logs repeatedlymisbehave -> repeatedly …
Note: See TracTimeline for information about the timeline view.