- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Fri, 28 Mar 2008 09:23:15 -0400
- To: "Thomas Roessler <tlr" <tlr@w3.org>
- Cc: public-wsc-wg@w3.org
Received on Friday, 28 March 2008 13:23:54 UTC
Great job. > - Error conditions are enumerated and mapped to error signalling > classes, along the lines of my previous message and Serge's > proposal. This part includes Johnath's language about (not) > keeping browser status, as revised by Tim Hahn. (The result from > ACTION-376.) > > The concrete choices of signalling levels here are strawmen. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#sec-tlserrors "When the URL corresponding to the transaction at hand does not match the certificate presented, and a validated certificate is used, then error signalling of level warning or above (6.4.3 Warning/Caution Messages , 6.4.4 Danger Messages) MUST be used." This one seems like a low ball to me. The whole point of the TLS server authentication is to match the certificate to the URL. Why is the low bar on this warning, instead of always danger? and conversely: "If TLS negotiation otherwise fails, error signalling of level danger ( 6.4.4 Danger Messages) MUST be used." I have no user intuition about this. Why is this danger?
Received on Friday, 28 March 2008 13:23:54 UTC