On 11/20/19 8:07 AM, Alan DeKok wrote:
On Nov 20, 2019, at 9:58 AM, Dan Harkins <[email protected]> wrote:
   The use-case of the document is that an individual is issued a client 
certificate.  That certificate contains an OID about the expected use-case 
(EAPoL), and also a list of SSIDs used to perform EAP.  When a client system is 
confronted with a set of SSIDs, it can cross-correlate the SSIDs it sees with 
SSIDs in it's certificate store.  The client system can then select an 
appropriate authentication method (EAP versus WPA-PSK), and also a client 
certificate to use.  Since it's selected a client cert, it can also verify the 
certificate chain back to the root.
[snip]
   I've never seen a client check it's own certificate chain during 
authentication.  Such a use-case would be ludicrous, which makes me wonder why 
you think that's what I was proposing.

  Above you refer to a client checking its own certificate in order to find an appropriate one to use for an SSID. And now this is the use case you claim is ludicrous. EXACTLY!

  Asking a CA to certify something that is ambiguous and unverifiable in order to use it
yourself is ludicrous.

   I would *also* argue that this information can be placed in a server 
certificate, for situations when client certificates are not being used.  As 
discussed extensively previously on this list, a client can connect to an SSID, 
obtain the server cert, and then verify:
   Yea, and that's why I gave you the list of actions a client takes and asked
you to point out where in the list this happens. You deleted the list.
   Yes.  Because I gave an explanation of how it works.  I want to be sure that 
the explanation is understood before going into further details.

   If my explanation makes no sense, then there's no point in me discussing 
technical details.

  It doesn't make sense because it's too late. You can't use unverifiable information in a certificate you have not yet obtained in order to make a network connection decision. So this unverifiable and ambiguous nonsense you want to put in a certificate is for a client
certificate and that use case is, as you note, ludicrous.

   I'm not proposing to prevent you from doing anything. I'm asking what's the 
point
and why. You didn't really provide one. And good luck getting a public CA to put
ambiguous and unverifiable information in a certificate for you.
   I've already addressed these points.  Please see my previous messages.

   I think this horse has been beaten to death.  I don't see any point in 
continuing it, unless there is progress.

  I think we have made progress and closure. The use case for unverifiable and ambiguous
nonsense in a certificate is ludicrous.

  Dan.


_______________________________________________
Emu mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/emu

Reply via email to