On Jan 7, 2020, at 9:54 AM, Ryan Sleevi <ryan-i...@sleevi.com> wrote: > At the high-level, I will say that using TLS (id-kp-serverAuth) certificates, > from the intersection of CAs that are commonly trusted by operating systems > and browsers, is bad. It will create security issues, will create > interoperability issues, and will not help users.
It's been accepted practice in all EAP implementations for ~15 years. Are there practical issues you're aware of? Because I can't recall seeing any. Any security issues are limited. If a site administrator has access to the public / private keys for a web server, it's possible to re-use those certs for EAP. This re-use cannot be prevented. > The set of CAs that are trusted for TLS on a given device, platform, or > application are intrinsically tied to purpose (TLS) and the library used to > implement that TLS and PKI behaviour. They are not separable, and trying to > do so is a problem, not a solution. This is perhaps most obvious as vendors > like Apple have tightly integrated PKI policy requirements (such as > Certificate Transparency) with the capability of their TLS libraries; for > several macOS/iOS releases, any application using a TLS library other than > Apple's CFNetwork would be unable to successfully verify a number of > certificates from CAs Apple trusted for TLS. > > EAP is not TLS, and your use case here is not TLS (clearly), so don't mess > with TLS, or you will break, eventually. The best I can do is try to > explicitly break you sooner, than later, so that I can deal with the fallout > sooner than later, and not when there's a critical issue in the TLS ecosystem > needing rapid resolution. I'm not sure what your point is here. I agree this usage is wrong, but the goal is to *fix* it. The goal isn't to "bless" the existing usage. The goal is to figure out what *should* supplicants do. > At a high-level, you're still fundamentally proposing a new root store. I > realize that may not be obvious, given the suggestion of intermediates with > id-kp-eapOverLAN, but that's still fundamentally what's being suggested, > because you still need to define a certificate profile (such as the EKU), > expected policies such as how that information is validated, and a process > for ensuring that validation is performed. I think that's a laudable goal, > and perhaps worth pursuing, but it's important to stress that in defining a > new root store, there's no reason to reuse anything extant. The fact that > operating systems may trust some organizations for other purposes (TLS or > S/MIME) should by no means be dispositive towards whatever you're doing. > Where to best propose certificate profiles or certificate policies for that > root store, I don't know, and that clearly requires a lot more implementor > experience and consensus to end up with something like the CA/Browser Forum > that is useful for TLS. EAP supplicant implementations largely do this already. So there's no "proposal" of a new root store. There's a statement that there *is* a different root store. i.e. implementations default to not trusting CAs for EAP. The trust has to be explicitly enabled by an admin, or by the user. This means that there's a store of CAs *only* for EAP. Everyone knows that it's wrong to use id-kp-serverAuth for EAP. The way forward is to figure out how to fix it. Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu