Russ Housley <hous...@vigilsec.com> wrote:
    > X.509 and RFC 5280 says that EKU is only useful in end entity 
certificates.

    > The CA/Browser forum says otherwise. They have defined a way for the
    > EKU in CA certificates to constrain subordinate certificates.

    > I prefer a different approach to such constraints, but when this was
    > last discussed, it became clear that no one was going to change their
    > code, so I dropped it.

Thank you for this history

    > The thread from 2016 starts here:
    > https://mailarchive.ietf.org/arch/msg/spasm/0UIEDAEhLK2iHNUhrH6VjDcbHmU/

I think that ietf-uta-tla13-iot will go with no EKUs in certification
authorities: useless bits for constrained IoT networks.


    >> On Nov 18, 2024, at 10:28 AM, Michael Richardson <mcr+i...@sandelman.ca> 
wrote:
    >>
    >> Signed PGP part
    >>
    >> Are Extended Key Usage values meaningful for root and subordinate CA
    >> certificates?
    >>
    >> 
https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-11.html#name-key-usage
    >> and:
    >> 
https://www.ietf.org/archive/id/draft-ietf-uta-tls13-iot-profile-11.html#name-key-usage-2
    >>
    >> I think they might be meaningless?
    >>
    >> --
    >> Michael Richardson <mcr+i...@sandelman.ca 
<mailto:mcr+i...@sandelman.ca>>   . o O ( IPv6 IøT consulting )
    >> Sandelman Software Works Inc, Ottawa and Worldwide
    >>
    >>
    >>
    >>


    > ----------------------------------------------------
    > Alternatives:

    > ----------------------------------------------------

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to