> On Jan 9, 2018, at 19:31, Peter Gutmann via dev-security-policy 
> <dev-security-policy@lists.mozilla.org> wrote:
> 
> Jonathan Rudenberg <jonat...@titanous.com> writes:
> 
>> For communicating with other machines, the correct thing to do is to issue a
>> unique certificate for each device from a publicly trusted CA. The way Plex
>> does this is a good example:
>> https://blog.filippo.io/how-plex-is-doing-https-for-all-its-users/
> 
> But the Plex solution required DynDNS, partnering with a CA for custom hash-
> based wildcard certificates (and for which the CA had to create a new custom
> CA cert), and other tricks, I don't think that generalises.  In effect this
> has given Plex their own in-house CA (by proxy), which is a point solution for
> one vendor but not something that any vendor can build into a product.

There is nothing special about this, hardware vendors regularly do a similar 
amount of work around discovery/provisioning for their devices. Additionally, 
there is nothing special about the CA, it can be done with Let’s Encrypt! For 
example: https://crt.sh/?q=%25.myfritz.net

These types of use cases (“IOT”) are regularly brought up by CAs on mailing 
lists, so I assume there are several that are quite happy to help you set 
something similar up.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to