On Jan 16, 2020, at 4:02 PM, Eliot Lear (elear) <el...@cisco.com> wrote:
> 
> Ok not for nothing but this is getting silly.

  Yes.

>  If a CA actually revoked a cert for someone using it for EAP, would they 
> also have to revoke for someone using it for SMTP, XMPP, and IMAP?

  That is apparently the claim.

>  Has that ever happened?

  I have no idea.

  Perhaps we should try?

$ openssl s_client -connect smtp.mozilla.org:587 -starttls smtp > mozilla.crt
$ openssl x509 -text -in mozilla.crt

....
            X509v3 Subject Alternative Name:
                DNS:smtp1.mdc1.mozilla.com, DNS:smtp1.private.mdc1.mozilla.com, 
DNS:smtp1.private.mdc2.mozilla.com, DNS:smtp.mozilla.com, DNS:smtp.mozilla.org, 
DNS:smtp1.mdc2.mozilla.com
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Extended Key Usage:
                TLS Web Server Authentication, TLS Web Client Authentication
....

  Yup.  *Everyone* uses id-kp-serverAuth.  For *everything*.

  Should we report this mis-use?  If so, why?  If not, why not?

  At this point, it might be simplest to just update 2459:

....
    id-kp-serverAuth              OBJECT IDENTIFIER ::=   {id-kp 1}
   -- TLS Web server authentication
....

  new ID: delete the word "Web".

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to