Hi Hannes

> On 24 Mar 2020, at 10:08, Hannes Tschofenig <hannes.tschofe...@arm.com> wrote:
> 
> Hi Eliot
>  
> You bring up a good point, namely the deployment environment. Are we are 
> talking about an IoT, an enterprise deployment environment or something else? 
> Clearly there will be differences. Reading through the text my impression was 
> that this is about an enterprise (or university) deployment environment. I 
> might, however, be on the wrong track here.

Since we’re talking about EAP, I can think of a few cases:

Classic enterprise/university case, IoT or not.  I was ASSUMING IoT because my 
brain goes to IOT, but I don’t think it has to be so.
There is also a wifi roaming device model, where EAP might be used in various 
service provider or federated environments a’la Eduroam or similar.  Today this 
is NOT a big IoT space, but soon?

The one place this is not a big deal at the moment is in the home, as 
WPA-Personal/PAE is the norm.

One additional question is how big the impact is between wired and wireless.  
Obviously with the former you worry less about interference and drops.

Eliot


>  
> Having the references to where deployment problems with large 
> certificates/certificate chains occur would shine light on this aspect.
>  
> Ciao
> Hannes
>  
> From: Eliot Lear <l...@cisco.com> 
> Sent: Tuesday, March 24, 2020 10:02 AM
> To: Hannes Tschofenig <hannes.tschofe...@arm.com>
> Cc: Michael Richardson <mcr+i...@sandelman.ca>; emu@ietf.org
> Subject: Re: [Emu] My review ... was RE: I-D Action: 
> draft-ietf-emu-eaptlscert-02.txt
>  
> Good morning Hannes
> 
> 
>  
> 
> 
> Also,
> from deployment experience, EAP peers typically have longer
>  certificate chains than servers.
> 
> I would like a reference to be included here. Theoretically, it makes no 
> sense to
> have a certificate chain for an EAP peer to have a longer certificate chain 
> than a server
> given a EAP peer talks to one EAP server.
> 
> In network access authentication it is not only about authentication but the 
> most important part is authorization. Hence, you pretty much always have a 
> one-to-one relationship between the EAP peer and the EAP server. There are no 
> good reasons to have complex CA hierarchies here.
>  
> Not sure I entirely understand you.  A few places are promoting new roots for 
> manufacturers.  And so the initial chain for a peer might look like 
> CA-Root->CA-Intermediate->Mfg  Root->Mfg Intermediate->Device.  I think it 
> may be possible to remove one of the intermediates, but probably not both.  
> It seems to me that this is an onboarding problem, and the best way to reduce 
> the cert chain size on a day to day basis would be to swap out for an 
> operational cert where the trust anchor is within the enterprise.  That means 
> you get one of those Big Fat transactions and then things settle down, and 
> that transaction may be handled specially anyway.
>  
> One comment I have in the draft relates to this text:
>  
>    o  Extensions are necessary to comply with [RFC5280], but the vast
>       majority are optional.  Include only those that are necessary to
>       operate.
>  
> This statement is just a little too general.  It very much depends WHICH 
> certificate we are discussing.  If it is a manufacturer certificate, as long 
> as you can roll to an enterprise cert, then who cares?  If it is an 
> enterprise certificate, then we have to look more closely.
>  
> So for instance, as Hannes mentions, authorization is a big issue.  Some of 
> that can be done outside of the certificate using ACE or similar, but some 
> may need to be present in the cert.  What we would rather not have is people 
> working the SAN to introduce authorization attributes.
>  
> Eliot
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy the 
> information in any medium. Thank you.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to