On Sat, Jan 18, 2020 at 5:58 PM Alan DeKok <al...@deployingradius.com>
wrote:

>   I'm trying to solve the problem of bootstrapping.  I agree that various
> CAs have various rules.  I agree that anyone can run their own private CA,
> and do whatever they want.  I've been doing that, and recommending it, for
> ~20 years.


Great. Let’s focus on one problem at a time to make sure it’s easier to
follow along. Earlier in the thread you seemed fixated on the first
problem, so it’s unclear when/where/how shifted to the second.

  When the CA *isn't* included with the OS distribution, it means that CA
> *cannot* be used to bootstrap TLS-enabled applications.  Each application
> (not just EAP) MUST be manually configured with the CA.


This isn’t true, if you mean that the end user needs to manually configure.
Modern OSes allow the application vendor - such as the supplicant vendor -
to explicitly configure.

  The alternative is to ask the application to naively trust a CA it
> doesn't know, and a CA which isn't included with the OS distribution.  I
> don't think that will happen.


The alternative is the application ships it’s own root store. Which
applications have been doing for 20+ years and which modern OSes make even
easier.

  It's easy for a browser vendor to tell a CA "issue certs our customers
> can use".  It's much, much, harder for anyone else to do the same thing.


Not really? CAs are plenty happy to sell whatever folks want. Look at stuff
like the drone PKI being developed.

What other application developers can’t do - and this is intentional - is
to get their certs and profiles for the same roots, even if they’re the
same issuing organization.

  It's less of an objection than a statement that we're back to the initial
> conclusion: use a private CA, manually configure, and ignore the root CAs
> shipped with the OS distribution.
>
>   How does that help with the bootstrapping problem?


I already gave that answer several times. Define your profile and policies,
pick (different) roots, and ship them in your software. It’s mistaken to
suggest that you HAVE to use the same roots as the OS.

  I'm happy to use a new PKI.  But we *cannot* and *must not* rely on every
> application to "do it yourself".  There must be a trust anchor shipped with
> OS distributions, that applications can leverage.


No, there doesn’t. That’s an unreasonable demand, because it’s insisting
that advocates of the problem don’t want to actually do the work involved
in developing a solution for the problem. There’s absolutely no reason to
require that it be shipped as part of the OS. Plenty of PKIs exist without
requiring that, and modern OSes make it easier.

Now, it may be that OSes do this, in the future, but that only happens by
first building the profile and policies. Because that’s all an OS root
store is: a set of CAs known to meet particular profiles and policies.
Anyone can define that.

> It’s completely unreasonable to be complaining “CA X won’t let me use
> certificates for this purpose” if you’re not addressing that with CA X. And
> it’s completely unreasonable to complain that Root stores intended for use
> case Y cannot be used with use case Z. Hammers make lousy screwdrivers,
> even if they are both “tools one uses when building furniture”
>
>   Sure.  So how does *my* application get Microsoft, Apple, etc. to ship a
> new PKI?


Provide a problem statement and a solution that’s compelling enough for
them to use? Fixating on the “new PKI” or “must be shipped in the OS” is
completely unreasonable expectation, especially when even the _existing_
PKI doesn’t solve the bootstrap problem unless you convince the OS. There’s
zero advantages to using extant PKI, and ample downside, and you can move
quicker and ship things by just doing the work.
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to