- From: Tom Ritter <tom@ritter.vg>
- Date: Mon, 21 Aug 2017 14:30:59 -0500
- To: Emily Stark <estark@google.com>
- Cc: httpbis <ietf-http-wg@w3.org>
* A "version" key, with an integer value. The UA MUST set this
value to "1" if the SCT is in the format defined in Section 3.2
of [RFC6962] and "2" if it is in the format defined in
Section 4.6 of [I-D.ietf-trans-rfc6962-bis].
I feel like it would be better to match the version field from the
SCT; which starts numbering at 0. Otherwise Version 1 in Expect-CT
corresponds to Version 0 SCTs, and Version 1 SCTs use Version 2 in
Expect-CT.
-tom
On 14 August 2017 at 17:46, Emily Stark <estark@google.com> wrote:
> This version expands the Expect-CT reporting format to support both RFC 6962
> and 6962-bis SCTs.
>
> ---------- Forwarded message ----------
> From: <internet-drafts@ietf.org>
> Date: Mon, Aug 14, 2017 at 3:43 PM
> Subject: New Version Notification for draft-ietf-httpbis-expect-ct-02.txt
> To: "estark@google.com" <estark@google.com>
>
>
>
> A new version of I-D, draft-ietf-httpbis-expect-ct-02.txt
> has been successfully submitted by Emily Stark and posted to the
> IETF repository.
>
> Name: draft-ietf-httpbis-expect-ct
> Revision: 02
> Title: Expect-CT Extension for HTTP
> Document date: 2017-08-14
> Group: httpbis
> Pages: 18
> URL:
> https://www.ietf.org/internet-drafts/draft-ietf-httpbis-expect-ct-02.txt
> Status:
> https://datatracker.ietf.org/doc/draft-ietf-httpbis-expect-ct/
> Htmlized: https://tools.ietf.org/html/draft-ietf-httpbis-expect-ct-02
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-expect-ct-02
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-httpbis-expect-ct-02
>
> Abstract:
> This document defines a new HTTP header, named Expect-CT, that allows
> web host operators to instruct user agents to expect valid Signed
> Certificate Timestamps (SCTs) to be served on connections to these
> hosts. When configured in enforcement mode, user agents (UAs) will
> remember that hosts expect SCTs and will refuse connections that do
> not conform to the UA's Certificate Transparency policy. When
> configured in report-only mode, UAs will report the lack of valid
> SCTs to a URI configured by the host, but will allow the connection.
> By turning on Expect-CT, web host operators can discover
> misconfigurations in their Certificate Transparency deployments and
> ensure that misissued certificates accepted by UAs are discoverable
> in Certificate Transparency logs.
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
Received on Monday, 21 August 2017 19:31:42 UTC