Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Jan-Frederik Rieckers
On 12.11.19 10:28, Michael Richardson wrote: > You were trying to do a CSR with some extra attributes with a CA (using > ACME? Using LetsEncrypt?) and the CA ignored the things that it couldn't > verify? No, it was a direct request to the CA of our research network. The problem here was, that the

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Michael Richardson
On 2019-11-12 3:53 p.m., Jan-Frederik Rieckers wrote: > On 12.11.19 00:15, Owen Friel (ofriel) wrote: >> One deployment consideration is if an operator wants to use a public PKI >> (e.g. Lets Encrypt) for their AAA certs, then it could be years, if ever, >> before these extensions could be

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Michael Richardson
On 2019-11-12 7:15 a.m., Owen Friel (ofriel) wrote: > This is also related to ongoing anima discussions about RFC 8366, and how it > can bootstrap trust when the pinned domain cert is a public PKI CA, and not a > private CA, and hence additional domain (or realm or FQDN) info is also > needed

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
On Nov 12, 2019, at 11:43 AM, Russ Housley wrote: > > Can the extended key usage for EAP over a LAN ( id-kp-eapOverLAN ) solve this > for you? It is defined in RFC 4334. A certificate for Web PKI should not > include this extended key usage. > > RFC 4334 also offers a certificate extension

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Cappalli, Tim (Aruba)
How does a public CA prove ownership of an SSID? From: Emu Date: Tuesday, November 12, 2019 at 3:08 PM To: Russ Housley Cc: emu@ietf.org Subject: Re: [Emu] Idea: New X509 Extension for securing EAP-TLS On Nov 12, 2019, at 11:43 AM, Russ Housley wrote: > > Can the extended key usage for EAP

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
On Nov 12, 2019, at 2:53 AM, Jan-Frederik Rieckers wrote: > > Signed PGP part > On 12.11.19 00:15, Owen Friel (ofriel) wrote: >> One deployment consideration is if an operator wants to use a public PKI >> (e.g. Lets Encrypt) for their AAA certs, then it could be years, if ever, >> before

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Russ Housley
> On Nov 12, 2019, at 2:53 AM, Jan-Frederik Rieckers > wrote: > > Signed PGP part > On 12.11.19 00:15, Owen Friel (ofriel) wrote: >> One deployment consideration is if an operator wants to use a public PKI >> (e.g. Lets Encrypt) for their AAA certs, then it could be years, if ever, >>

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Cappalli, Tim (Aruba)
Regardless of validation levels, it is not possible to own an ESSID. It is possible, however, to own a domain, email address, physical address, etc. That's the difference. Putting an ESSID in a certificate is a slippery slope. I doubt any public CA or OS vendor would ever entertain this. Tim

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
On Nov 12, 2019, at 3:13 PM, Cappalli, Tim (Aruba) wrote: > > How does a public CA prove ownership of an SSID? Do public CAs *always* verify addresses and/or telephone numbers, which are normally included in certificates? Do public CAs verify that email addresses in the certificate work?

Re: [Emu] Idea: New X509 Extension for securing EAP-TLS

2019-11-12 Thread Alan DeKok
On Nov 12, 2019, at 6:59 PM, Cappalli, Tim (Aruba) wrote: > > Regardless of validation levels, it is not possible to own an ESSID. It is > possible, however, to own a domain, email address, physical address, etc. > That's the difference. I think that's largely begging the question. Your