Re: [Smcwg-public] [EXTERNAL]-Re: Fields for S/MIME CSRs

2023-09-29 Thread Pedro FUENTES via Smcwg-public
Well… given that anyone can generate a CSR containing arbitrary information, taking this a a criteria for linking the public key with the “who” can lead to dangerous assumptions. Anyway I understand your exercise and intent. In our case we don’t see fit taking anything from the CSR but the public

Re: [Smcwg-public] [EXTERNAL]-Re: Fields for S/MIME CSRs

2023-09-29 Thread Ben Wilson via Smcwg-public
Hi, It seems simply, as a method of tracking, that Certificate Issuers might find it helpful to have an email address in the CSR. Plus, if you're establishing proof of possession, then doesn't it help to know something about "who" is asserting possession of the key pair? (I don't think a CSR with

Re: [Smcwg-public] [EXTERNAL]-Re: Fields for S/MIME CSRs

2023-09-29 Thread Pedro FUENTES via Smcwg-public
That’s an interesting point, but the same than there’s no need to consider the domains coming in the CSR to issue TLS certificates, I personally don’t see the practical need here. For example… We could have an Enterprise RA that can issue certs for any email address in a set of preauthorized

Re: [Smcwg-public] [EXTERNAL]-Re: Fields for S/MIME CSRs

2023-09-29 Thread Ben Wilson via Smcwg-public
Shouldn't at least the email address be included, and verified, of course, by the CA? On Fri, Sep 29, 2023, 11:35 AM Pedro FUENTES wrote: > +1 > > > Le 29 sept. 2023 à 17:52, Clint Wilson via Smcwg-public < > smcwg-public@cabforum.org> a écrit : > > Hi all, > > In my opinion, CSRs should

Re: [Smcwg-public] [EXTERNAL]-Re: Fields for S/MIME CSRs

2023-09-29 Thread Pedro FUENTES via Smcwg-public
+1 > Le 29 sept. 2023 à 17:52, Clint Wilson via Smcwg-public > a écrit : > > Hi all, > > In my opinion, CSRs should really be limited to conveying the public key and > a proof of possession of the private key; the fields included therein may act > as confirmatory signals for a CA, but