On Thu, Jun 19, 2025 at 10:04:47PM -0500, Nico Williams wrote:

> > If making a serverAuth intermediate is acceptable, then it sounds like
> > there is no issue here: just self-sign it and submit that to the
> > Chrome Root Program. The policy doesn't say anything about the parents
> > of the roots. (That would be indeed outrageous!)
> 
> I'm guessing the rationale for Google's change is to protect apps that
> support client certificates poorly (usually the norm) that

I haven't seen a definitive statement of the rationale, I am sceptical
that the Chrome browser would be concerned about the security of some
server soliciting and misinterpreting client certificates.  David
Benjamin's mention of hypothetical cross-protocol issues is somewhat
more plausible, but not in my opinion defensible.

Abrupt removal of features that fall just outside their particular
use-case, without taking other, be they minority, use-cases into
account, looks at least inconsiderate if not outright hostile.

Is there an up and running Let's Encrypt alternative root for client
cert issuance that non-web-server ACME clients (dual-rĂ´le servers) can
use instead?

> Does Google's change break previously-working use cases?

Yes.  Let's Encrypt intermediate issuers no longer vend EE certs with a
"clientAuth" EKU.

> I think perhaps what is desired is a policy that WebPKI root CAs (the
> ones in browsers' default trust anchors) should only issue intermediate
> CA certificates that only issue certificates with:
> 
>  - empty DN
> 
>  - dNSName SANs
> 
>  - no other SANs of any other kind
> 
> Then allowing clientAuth would be well enough, I suppose.

That may be sufficient for most of the relevant use-cases, but
are Google and the CA/B Forum willing to budge from the present
"get yourself another !@#$%^& PKI" position?

-- 
    Viktor.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to