@@ -608,9 +608,7 @@ require a second factor of authentication.
608608
609609!!! info "Revocation detection"
610610
611- For information on how revocation detection is supposed to be handled, concern the excerpt
612- <a href="#idcert-cache-ttls">"Caching ID-Certs and cache TTLs"</a>
613- TODO fix link
611+ For information on how revocation detection is supposed to be handled, concern [section 6.4](#64-caching-of-id-certs)
614612
615613TODO: Write about identifier changing and how to handle that across servers
616614TODO: Perhaps recommend never using more than a specified number of certificates at once to make
@@ -654,8 +652,9 @@ ID-Cert attached to the message and ensuring its public key matches the sender's
654652???+ example
655653
656654 Say we have two actors. Alice, who is registered on Server A, and Bob, who is registered
657- on Server B. Alice and Bob **are having a conversation on Server B**. Given a signed message from Alice,
658- such as Bob would receive from Server B, the process of verifying the signature would look like this:
655+ on Server B. Alice and Bob **are having a conversation on Server B**. Given a signed message from
656+ Alice, such as Bob would receive from Server B, the process of verifying the signature would look
657+ like this:
659658
660659 ```mermaid
661660 sequenceDiagram
@@ -691,10 +690,6 @@ ID-Cert attached to the message and ensuring its public key matches the sender's
691690 Understanding both sections is crucial for building secure, scalable and compliant
692691 implementations of polyproto.
693692
694- TODO: IDEA: To keep other servers from not re-requesting the idcert after the ttls has passed, the
695- idcert should have some sort of timestamp that is signed by the original server, so that clients can
696- verify that a server has the most up-to-date idcert cached for a user -flori
697-
698693!!! info
699694
700695 A failed signature verification does not always mean that the message is invalid. It may be that
0 commit comments