On 2025-06-19 01:58:05, Andrew Chen wrote:
Somewhat tongue in cheek -- have you considered buying certificates from
CAs distrusted by Chrome and Mozilla? If you're operating outside of the
WebPKI ecosystem, I'm guessing you don't really care about the CA distrusts
have occurred over the last few years (or ever?). Perhaps DigiCert would be
willing to sell you a certificate with the clientAuth EKUs from their
distrusted Symantec and Verisign roots? Another option might be any of the
distrusted Entrust roots.

Andrew

Well are they still trusted by the operating system then?

The netire point of using the Web-PKI was because it is the common denominator of all of the different platforms and therefore universally supported.

The issue with the current policy change is taht you can't even buy such certs anymore as now all of them are as good as if you'd just self signed them to begin with.

So the issue remains what certificate to I present that you trust without having interacted with me before to properly authenticate the system using its dns domain or ip address? All that your server cares about is that my server is from the domain it claims to be from (aka that no maliciouse 3rd party can impersonate it. Incliding for the very first connection our systems ever made. Regardless of your system connecting to my system or my system connecting to yours. And not just with two parties but with an unknown and constantly changing number of parties that are spread out globally. So how would using the Symantec or Entrust roots help in these deployments? And even more interestingly how would it be secure? I mean why would anyone trust them after they have already lost their trust within the Web-PKI years ago? Managing what is and is not trusted is one of the reasons why PGP with the Web of Trust never managed to replace the Web-PKI...

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to