On Jan 16, 2020, at 4:02 PM, Eliot Lear (elear) <el...@cisco.com> wrote: > > Ok not for nothing but this is getting silly.
Yes. > If a CA actually revoked a cert for someone using it for EAP, would they > also have to revoke for someone using it for SMTP, XMPP, and IMAP? That is apparently the claim. > Has that ever happened? I have no idea. Perhaps we should try? $ openssl s_client -connect smtp.mozilla.org:587 -starttls smtp > mozilla.crt $ openssl x509 -text -in mozilla.crt .... X509v3 Subject Alternative Name: DNS:smtp1.mdc1.mozilla.com, DNS:smtp1.private.mdc1.mozilla.com, DNS:smtp1.private.mdc2.mozilla.com, DNS:smtp.mozilla.com, DNS:smtp.mozilla.org, DNS:smtp1.mdc2.mozilla.com X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication .... Yup. *Everyone* uses id-kp-serverAuth. For *everything*. Should we report this mis-use? If so, why? If not, why not? At this point, it might be simplest to just update 2459: .... id-kp-serverAuth OBJECT IDENTIFIER ::= {id-kp 1} -- TLS Web server authentication .... new ID: delete the word "Web". Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu