>>Then why use ACME to begin with?

What I understand it was to make it easier for “newbies” to set up a device. So 
the device can automatically do “inclusion” of itself once it connects to a 
network. 

 

I see no security problems with allowing longer certificates, since the 
certificates are only locally used, and hard-restricted to the particular 
network that uses the certificate.

For certificates on the internet, its important with short lifetimes, 
revocation and such, since there unauthorized people can get on board. For 
local networks this isn’t a risk.

                             A non-revoked certificate is only a risk if a 
malicious actor gets its hand on a device after It changed owner, what my 
suggestion of mandatory    reset if it is not connected, or connected to a 
network the device doesn’t recongnize based on certificate AND a new user is 
paired through a           method that doesn’t require cooperation by a already 
paired user/device.

 

These 2 circumstances together is clear evidence that the device itself is not 
being owned by the same user anymore, thus it should erase any keys and 
certificates for security, both so the new user cannot act maliciously against 
the old user, AND so the old user cannot act maliciously against the new user.

 

Best regards, Sebastian Nielsen

 

 

_______________________________________________
Acme mailing list
Acme@ietf.org
https://www.ietf.org/mailman/listinfo/acme

Reply via email to