On Thu, May 21, 2020 at 11:23 AM Ryan Sleevi <ryan-ietf...@sleevi.com> wrote
<snip>
>>
>> I am aware of the "fight" about EKU chaining.  I have a view, but I did not 
>> really want to drag subcerts into that controversy.
>
>
> Sure, but unfortunately, the design of DC/subcerts is a direct result of that 
> running code.
One of the hard requirements for our deployment was that the same
certificate be useable with DCs and without. A different EKU would be
more problematic then an extension for this purpose, and while it
might be more or less irritating for implementors depending on how
their stack works (sorry Rich -
https://boringssl-review.googlesource.com/c/boringssl/+/33666/1 might
serve as inspiration, but the client side got dropped for similar
issues). We know the extension doesn't bust things, I don't know an
EKU would, and the root program issues make me hesitate.

Anyway it sounds like no one really has a problem with an extension,
just a question.

Sincerely,
Watson Ladd

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to