On 11/20/19 4:11 AM, Alan DeKok wrote:
On Nov 20, 2019, at 5:23 AM, Dan Harkins <[email protected]> wrote:
I am asking for
ambiguous data to be certified and placed in my certificate for my own use? If 
this attribute
is in a certificate I receive then what does it mean to "select the correct 
certificate for
authentication in a particular WLAN"?
   The text explains this in detail.  I'll summarize.

   The use-case of the document is that an individual is issued a client 
certificate.  That certificate contains an OID about the expected use-case 
(EAPoL), and also a list of SSIDs used to perform EAP.  When a client system is 
confronted with a set of SSIDs, it can cross-correlate the SSIDs it sees with 
SSIDs in it's certificate store.  The client system can then select an 
appropriate authentication method (EAP versus WPA-PSK), and also a client 
certificate to use.  Since it's selected a client cert, it can also verify the 
certificate chain back to the root.

  So you asked for imprecise, ambiguous, and unverified information to be put in your own certificate for you to use later. Just because something is in an
RFC doesn't make it right. And appeal to RFC is another form of appeal to
authority fallacy.

  Oh, and what's the point of verifying the chain of your own certificate prior to connecting to a network? Do you do OCSP responses to see if your certificate
has been revoked?

   I would *also* argue that this information can be placed in a server 
certificate, for situations when client certificates are not being used.  As 
discussed extensively previously on this list, a client can connect to an SSID, 
obtain the server cert, and then verify:

  Yea, and that's why I gave you the list of actions a client takes and asked
you to point out where in the list this happens. You deleted the list.

a) the server cert is intended for EAPoL (and is not just a cert taken from a 
web server)
b) the SSIDs in the cert match the SSID used to authenticate
c) the NAIRealm in the cert matches a user identifier stored in the client 
system

   In which case the client has *more* information than what is available to it 
today, and can thus make better decisions about whether or not to accept the 
cert.

  If the information is ambiguous and unverified why would you use it in a decision
to accept a certificate or not?

   This attribute seems useless to me and its ambiguity and therefore 
unverifiability is a
large reason why.
   I would suggest not using it for your own purposes then.  I would also 
suggest allowing *others* to use it, if they find it useful.

  I'm not proposing to prevent you from doing anything. I'm asking what's the point and why. You didn't really provide one. And good luck getting a public CA to put
ambiguous and unverifiable information in a certificate for you.

  Dan.




_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to