Esko Dijk <esko.d...@iotconsultancy.nl> wrote:
    > If the EKU is present, it will restrict the allowed usage purposes of
    > the certificate to only those items listed in the EKU. So, if a client
    > needs to use such certificate for DTLS/TLS, it needs to add
    > id-kp-clientAuth.
    > And if a server needs to use such certificate for DTLS/TLS it needs
    > id-kp-serverAuth.

    > Consequence for a Registrar server, that MUST have id-kp-cmcRA set, is
    > that it also needs id-kp-serverAuth set in the EKU.  Older DTLS 1.2
    > stacks for example may not check EKU yet in such a way (e.g. an older
    > Scandium I used did not check) but I expect never 1.2/1.3 stacks to
    > check EKU.

    > @Michael this could be worth adding to our constrained-BRSKI draft as a
    > clarification, as it seems non-trivial. (It was to me for sure.)
    > And maybe also keep this for considerations for a BRSKI-bis document.

So, I've opened https://github.com/anima-wg/constrained-voucher/issues/146.
I agree that we should put it constrained-voucher.

It sounds like you also think it deserves an errata.


--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to