Alan: > > On Nov 9, 2019, at 1:00 PM, Russ Housley <hous...@vigilsec.com> wrote: >> >> With a very quick skim, it appears that you are trying to do the same thing >> as RFC 7585. > > I think there's overlap, but it's not quite the same thing. > > Both proposals add a "known realm" as an X.509 certificate property. They > differ in their usage, and in who is checking the fields. I'll quickly recap: > > RFC 7585 allows for RADIUS clients to dynamically discover RADIUS servers > via DNS. As a sanity check, the discovered RADIUS server should induce the > "known realm" in its server certificate. The RADIUS client verifies that the > "known realm" field matches the domain it was looking for. Note that this > verification is done by a RADIUS client, and is independent of the > authentication mechanism carried inside of RADIUS. (PAP, CHAP, EAP, etc.) > > In this proposal, the supplicant is the component which is checking the > "known realm" field. The supplicant verifies that the NAI it's sending > matches the "known realm" sent by the server. > > It is common practice today for server certificates to include a contact > email address in the common name field. However, there's no requirement that > this is done. No one checks the domain of that email address against the NAI > being used by the supplicant. > > I think that this proposal may be useful. Given that the parties who check > this field do so for different purposes, it may be useful to have two > separate OIDs. > > On the other hand, RCC 7585 uses the OID for TLS connections which then > carry RADIUS packets. This draft would use an OID for EAP-TLS > authentications, which are carried inside of RADIUS, and then inside of UDP / > TCP / TLS / DTLS. The uses-cases may be different enough to warrant re-use > of the same OID.
Thanks for the overview. It was very helpful. RFC 7586 define the NAIRealm as an otherName in the SubjectAltName of a certificate. It seems that the NAIRealm name form works equally well, regardless of the role that the certificate holder is performing in the protocol. Russ _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu