On Jan 17, 2020, at 1:29 PM, Michael Richardson <mcr+i...@sandelman.ca> wrote:
> You omitted an important part of that output, which is the name of the CA,
> which I include below.

  Sure.

> It could be that the CSP permits SMTP, or SUBMISSION service.
> Ryan has suggested that CAs could put EAP-TLS (or EAP-TEAP) into their CSP,
> and that also seems like an out.

  I agree.

> Certainly, some of the excitement for ACME/Letsencrypt with DNS-01 challenge
> is that it makes it easy to get a certificate for a non-HTTP thing.
> 
> I think we need to fix the lawyers, not the protocol.

  That is likely the best approach.  At this point, use of id-kp-serverAuth is 
wide-spread *outside* of HTTP.  EAP / RADIUS is not unique in it's mis-use of 
that OID.

  As such, this discussion should more productively focussed on non-HTTP 
mis-uses of id-kp-serverAuth.  Which means pretty much everything using TLS.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to