To recap and extend some things that were said at the meeting:

- ACME can already be used for client certificates that attest to domain
names.  It's just an EKU difference, so it can be negotiated in the CSR.

- ACME can already be used for code-signing certs, with external
validation.  As with client certs, the relevant EKUs can be negotiated in
the CSR.  None of the empirical validation mechanisms are appropriate; the
authority token work might be relevant.

- FIDO does not define or issue certificates of any type.


On Thu, Mar 28, 2019 at 3:25 PM Thomas Peterson <hidinginthe...@gmail.com>
wrote:

> Thank you for your draft.
>
> As per the discussion from the WG meeting in Prague, my thoughts:
>
> Section 5, Device Certificates:
> DNS/IP based challenges may be appropriate for on-premises hardware and
> less appropriate for Cloud or IoT environments where a machine
> requesting may not have DNS or suitable IP address. For Cloud
> deployments it may be more desirable to tie the challenge to the
> platform's respective IAM service using draft-ietf-acme-authority-token.
>
> In terms of actions, an informative document describing considerations
> (such as ensuring "TLS Client Certificate Authentication" is set in CSR,
> like you describe) would probably be most appropriate in my view and I
> would be happy to co-author or contribute to it if there was interest.
>
> Section 6, End User Certificates:
> I had considered the idea of using ACME for end user certificates (and
> believe it's worth it, particulary in enterprise environments), as I was
> unaware of the possibility of FIDO being used. However CAs and
> implementors may find using ACME better for consistency sake as they may
> already be doing existing issuance using it.
>
> Browser support I believe remains the biggest challenge for this and I
> would like to hear the thoughts from browser vendors on list.
>
> Regards
>
> On 20/03/2019 14:59, Kathleen Moriarty wrote:
> > Hello,
> >
> > I am attaching a draft on several client certificate types to discuss in
> > Prague.  The draft intentionally leaves some open questions for
> > discussion and I'll form the slides for the presentation in Prague
> > around those questions.
> >
> > Thanks in advance for your review and discussion in Prague.
> >
> > Safe travels!
> >
> > --
> >
> > Best regards,
> > Kathleen
> >
> > _______________________________________________
> > Acme mailing list
> > Acme@ietf.org
> > https://www.ietf.org/mailman/listinfo/acme
> >
>
> _______________________________________________
> Acme mailing list
> Acme@ietf.org
> https://www.ietf.org/mailman/listinfo/acme
>
_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to