I agree, the likelihood of the application correctly walking the path and validating the chain is very small. I strongly prefer leaving it a MUST use TLS and validate the server per RFC 6125. The other thing to note is that the CN of the cert is not in the header. If TLS is not used an attacker could simply modify the DNS to retrieve any valid certificate and use that to sign. Not using TLS breaks the main trust model. If someone wants to map the "iss" to the cert CN and walk the chain to a trusted root, that is fine. I don't think having to have a TLS certificate for the server they are publishing the x5u on is going to be an impediment for them. John B. On Sep 30, 2014, at 4:08 PM, Dave Cridland <dave@xxxxxxxxxxxx> wrote:
|
<<attachment: smime.p7s>>