On Jan 18, 2020, at 4:11 PM, Ryan Sleevi <ryan-i...@sleevi.com> wrote: > > You’re conflating several things, as well as seemingly shifting the goal > posts here. Perhaps it’s just a poor expression of the problem, as you see > it, in which case, it might help to be clearer.
I'm trying to solve the problem of bootstrapping. I agree that various CAs have various rules. I agree that anyone can run their own private CA, and do whatever they want. I've been doing that, and recommending it, for ~20 years. > Can’t get eapOverLan from a TLS CA? Ok. That’s not a bug, that’s not a > misdesign, that’s how it works and is supposed to work. Where you say "TLS CA", you mean "WWW CA". All these other applications use TLS, too. In practice, that WWW CA design translates into "CAs which are included with OS distributions". Which means "CA trivially usable by applications". ALL applications. Not just the browser. Is it any surprise that *all* applications ended up leveraging that functionality? When the CA *isn't* included with the OS distribution, it means that CA *cannot* be used to bootstrap TLS-enabled applications. Each application (not just EAP) MUST be manually configured with the CA. The alternative is to ask the application to naively trust a CA it doesn't know, and a CA which isn't included with the OS distribution. I don't think that will happen. It's easy for a browser vendor to tell a CA "issue certs our customers can use". It's much, much, harder for anyone else to do the same thing. > > That is mostly true, but unhelpful. Windows doesn't ship with "Billy > > bob's tackle shop & CA" root certificates. Neither does Linux, OSX, etc. > > Your statement here is just a rephrasing of "use a private CA", and > > "manually configure things". > > Yes, exactly, which is why I’m not sure the objection. It's less of an objection than a statement that we're back to the initial conclusion: use a private CA, manually configure, and ignore the root CAs shipped with the OS distribution. How does that help with the bootstrapping problem? > If you don’t like those policies, or you want more purposes, do your own > thing. The same modern OS distributions provide that capability for > applications to do so, to allow the application vendor to select their trust > store, and It Just Works. > > Can’t find someone who does what you want? That’s not a problem: you can do > it yourself. In discussing the second problem, there is absolutely zero > reason to use anything existing. None whatsoever. I'm happy to use a new PKI. But we *cannot* and *must not* rely on every application to "do it yourself". There must be a trust anchor shipped with OS distributions, that applications can leverage. > It’s completely unreasonable to be complaining “CA X won’t let me use > certificates for this purpose” if you’re not addressing that with CA X. And > it’s completely unreasonable to complain that Root stores intended for use > case Y cannot be used with use case Z. Hammers make lousy screwdrivers, even > if they are both “tools one uses when building furniture” Sure. So how does *my* application get Microsoft, Apple, etc. to ship a new PKI? Answer: even Microsoft and Apple can't do it for their own applications. They just leverage the pre-existing WWW PKI. If trillion dollar companies can't deploy a new PKI for their own applications, it's entirely unreasonable to ask that of a minor cog like me. Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu