On Nov 13, 2019, at 6:23 PM, Michael Richardson <mcr+i...@sandelman.ca> wrote:
> 
> I think that the issue isn't, can we find or define a OID that has the
> right semantics.
> I think that the issue whether or not any public CAs are willing to
> include that into a certificate.

  That's less relevant than it may be.

  The common practice for years has been to recommend self-signed or "internal" 
CAs.  The original reason was that supplicants didn't do certificate pinning.  
So if they were configured to trust a root CA, they would send user credentials 
to *any* EAP authentication server which had a certificate signed by that CA.  
With certificate pinning, they now warn if the server certificate changes.

  The other reason is that supplicant configuration is still largely a manual 
process.  If admins need a complex process to configure the supplicant, then 
adding a self-signed CA to the mix has near-zero cost.  And supplicant vendors 
seem entirely disinterested in a standard way to configure them.

  The other benefit of self-signed CAs is that they're free.  No verification 
is required.  Since the admin controls both the CA and the end user machine, 
he's free to do whatever he wants, when he wants.

  As to why self-signed CAs are appealing, here's an example.   I've had 
"interesting" times trying to renew a simple certificate for HTTPS usage.  The 
CA was happy to take my money and "verify" ownership of a domain.  But they 
were entirely uninterested in sending me an actual certificate.  Their support 
system was similarly unhelpful.  In the end, I went with a simpler approach.  
And I can't be the only person that this happened too.

  The gating issue for me is supplicants.  It's easy to update Open Source 
supplicants to check new OIDs.  The larger vendors might upgrade.  Eventually.  
Maybe.

  On a technical front, a major issue is also *how* to upgrade.  What do 
supplicants do?  Allow both OIDs?  When do they start rejecting certificates 
with the "TLS web server" OIDs?

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to