Support for trusted_ca_keys extension during TLS handshake

Nikos Mavrogiannopoulos nmav at
Wed Oct 31 18:45:02 CET 2012

On 10/31/2012 06:40 PM, David Fuhrmann wrote:

>> I don't know whether you can apply it in your case, but why not use
>> the "traditional" PKI there. Have a root CA to sign all other temporal
>> CAs and have all the devices to trust the root one. It sounds more
>> elegant approach than having the server decide which certificate to
>> use based on the connecting client trusted CA.
> Yeah, sure, but the root certificate to be installed inside the client already lasts 40 years.
> The system is to be designed to work longer than that, and it not so a good idea to create an even longer "super" root CA.

Indeed, in such a system you'll have such issues. The biggest looks like
whether the existing algorithms would stay secure for that long.
Nevertheless, if you try implementing this extension it wouldn't be that


More information about the Gnutls-devel mailing list