-
In the last call on 2023-09-13 the concern was raised, that the current idea of a "credential format profile" does not provide that much value to parties which are interested in the credential format …
-
I'm currently building out some tools where I would like to use the feature negotiation part of the ricochet control channel.
Currently this aspect is mostly undefined in the protocol, with clients…
s-rah updated
6 years ago
-
Hi,
I think I found a regression when using version 1.4 compared to 1.2. The problem is when doing PKINIT using a smartcard with a windows 2008 r2 kdc (not tested with a linux kdc).
The linux client…
-
TUF is supposed to be about crypto agility (vs what I call "crypto rigidity"), but unfortunately, the specification currently falls somewhere in the middle.
Some cryptosystems are deliberately simp…
-
It feels like leaving the verifier to wade through a schema definition or 'scheme-sniff' returned data for the crypto schemes the response items use would be messy, misfire-prone process. As such, sho…
-
The single error case of this `TryFrom` is just an invalid length error. There is a host of other problems completely ignored by the current implementation:
- there are sequences of 32 bytes that wil…
-
This should be renamed to 'Add digital wallet or agent'.
The form should include the following fields:
- Name (free text)
- Logo (free text, link to resource)
- Company (free text)
- Company UR…
-
**Description**
Now that NIST has [announced](https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms) the first few quantum-resistant cry…
-
All private keys are encrypted in the keystore. The next public keys may benefit from also being encrypted.
Currently they are not exposed in the KEL because only their hashes are exposed. But it …
-
The request signing extension currently only supports Ed25519 for signing requests. In the event that future research indicates this algorithm shouldn't be used, there should be a well-defined way for…