On Jan 18, 2020, at 11:10 AM, Ryan Sleevi <ryan-i...@sleevi.com> wrote:
> If the point was a singular CA seeming to violate their CP/CPS (that is, 
> DigiCert), then yes, absolutely, you can go submit a CA problem report and 
> the CA is obligated to respond in 24 hours with their analysis to your 
> problem report. 

  I would recommend putting policies into practice.

  I disagree with those policies, so I don't feel responsible for putting them 
into practice.

> >  Those policies can best be described as "opaque".  There is no clear 
> > statement that "using certs with id-kp-serverAuth in non-WWW protocols is 
> > grounds for revocation".
> 
> I whole heartedly agree! To continue to connect it back to the original 
> discussion, so that thread is not lost: if your use case (for example, 
> EAP-TLS) wants to allow subjectivity and flexibility in how statements like 
> this are interpreted, then you have to make sure other stakeholders are not 
> also involved. That’s all.

  I don't understand the relevance of that statement.

  The concern is that *existing* CAs have policies which prevent EAP-TLS admins 
from using their certificates.  These policies apply to pretty much all non-WWW 
protocols.  The implication above is that these people can just start their own 
CAs.

  That's nice, but doesn't solve the problem.

>   Where can I get a certificate with id-kp-eapOverLAN?  Or where can I get a 
> cert designed for use with STMP, XMPP, etc.?
> 
> https://wiki.xmpp.org/web/XMPP_Server_Certificates
> https://xmpp.org/about/xsf/records/proposals/intermediate-certificate-authority

  XMPP.  Not id-kp-eapOverLAN.  And not SMTP, not RADIUS over TLS  Not DNS over 
TLS, and so on.

> This is the problem with ignoring the broader message. “The CAs” is a term 
> without useful meaning. Everyone can be a CA. You can be a CA. I can be a CA. 
> Anyone who wants can issue certificates. There’s no set of entities blessed 
> in some special power which only they can mint certificates, and thus their 
> choices not to do so somehow be a sign of neglect.

  That is mostly true, but unhelpful.  Windows doesn't ship with "Billy bob's 
tackle shop & CA" root certificates.  Neither does Linux, OSX, etc.  Your 
statement here is just a rephrasing of "use a private CA", and "manually 
configure things".

  The root CAs that ship on modern OS distributions *are* blessed with a 
special power.  Only they can mint certificates which are *automatically* 
trusted by most applications on the OS.

> Want id-kp-eapOverLan? Sure, plenty will happily do that for you, for a 
> price. Don’t like the price? Run your own CA and issue them yourself. There’s 
> zero cost, and plenty of open-source tools to make “run your own CA” be a 
> single line on a command-shell.

  Windows actually *forbids* id-kp-eapOverLAN from being used by the well-known 
root CAs:

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj200219(v%3Dws.11)

...
You must deploy a private CA rather than obtain server certificates from a 
third party public CA. In addition, the certificate template that you use to 
issue the certificates must contain the RADIUS EKU extension. This extension is 
id-kp-eapOverLAN and the object identifier (OID) for this EKU is 
1.3.6.1.5.5.7.3.14. This EKU extension can only be configured on a private CA 
and is used by Windows 8 to determine whether a private CA issued the 
certificate.
...

  This use-case would also seem to be outside of the scope envisioned by RFC 
4334, which applies to client certificates.

> Now, it may be that when you CAs, what you mean is “I can’t get a certificate 
> from the set of organizations that operate private keys/trust anchors, 
> trusted for this purpose in a default install of my operating system / 
> browser / insert X here, and which chains to that public key”. That is, you 
> can’t get one of these certs chaining to the same root. Some might, but 
> you’re right, that’s much more rare. And that’s a feature, not a bug or 
> neglect, because you should be using separate hierarchies if you have 
> different needs.

  That statement is a decade too late.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to