On Jan 15, 2020, at 11:07 PM, Benjamin Kaduk <ka...@mit.edu> wrote:
> Is there anything better for implementations to actually do (as distinct
> from what we write down as recommendations) than to start setting up a
> parallel (purpose-specific) PKI now and trusting that in parallel with what
> they're currently doing, with the hope of being able to have a flag day
> many years down the line when the new PKI becomes the only thing that's
> trusted?

  I don't think so.

  It's common practice to use private CAs.  Usually, self-signed ones.

  One major driver for private CAs was initially that EAP supplicant 
implementations did not cache the server certificate.  So if the supplicant 
trusted a root CA, it trusted *all* certificates issued by that root CA.  Which 
was a major security issue.

  Supplicants now cache the server certificate, even if they trust the root CA. 
 This lets them warn the user if the server certificate changes.

  But this process also means that the user is warned on normal certificate 
expiration / replacement.  There is currently no guidance to implementations as 
to what should be done here.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to