348
edits
| Line 74: | Line 74: | ||
The straightforward approach is to place them on an SSL-protected website. We would then be vulnerable to any attack which can compromise SSL. | The straightforward approach is to place them on an SSL-protected website. We would then be vulnerable to any attack which can compromise SSL. | ||
Rather than invent a new scheme, mhanson proposes to use an RFC5785 | Rather than invent a new scheme, mhanson proposes to use an RFC5785 / RFC6415 compliant ".well-known/host-meta" file, which is an XRD containing a LINK with a REL of "receipt-verification-keys", which points to a file containing an array of [http://tools.ietf.org/id/draft-jones-json-web-key.txt JSON Web Keys]. | ||
=== Appendix C: Key Compromise and Receipt Reissuance === | === Appendix C: Key Compromise and Receipt Reissuance === | ||
edits