On Wed, Jun 18, 2025, 10:42 PM Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

> On Tue, Jun 17, 2025 at 02:16:19PM -0400, David Benjamin wrote:
>
> > This draft is not the way to solve this problem.
>
> I should mention, that though that is also my reaction, we are by no
> means on the same page here.  I find the Google position in:
>
>
> https://googlechrome.github.io/chromerootprogram/#321-applicant-pki-hierarchies
>
> to be substantively indefensible.  Google are not merely saying that
> Chrome will not trust certificates with a "mixed" client/server EKU
> (which is a nuisance position I can live with), rather they are coërcing
> the CAs to not issue any client certificates even for non-Chrome
> use-cases.  That in my view is massive overreach, bordering on
> (if not squarely) monopolistic behaviour.
>

No they are saying the CA has to issue those off a different hierarchy.
Nothing prevents the CA from offering that service.

>
> > The point of markers like EKUs is to avoid cross-protocol attacks.
>
> Sure, but *TLS* client auth vs. *TLS* server auth is NOT a
> *cross-protocol* attack.  The Certificate chains presented by clients
> and servers have the same structuure in TLS protocol and the certificate
> verify messages are constructed identically, both covering the handshake
> trascript to that point in the protocol.  Yes, the key holder may have
> just one the usages in mind, and so request a certificate for just one
> of the two roles, and Chrome might (a nuisance) might be in a position
> to refuse to trust mixed use certificates, but to preclude the CA from
> issuing mixed-use certificates, seems to be an invitation for just the
> kind of work-around seen in the proposed solution.
>
> The fix is for Google and the CAs to back down and make it possible to
> obtain clientAuth, serverAuth or clientAuth+serverAuth certificates from
> the same (not just WebPKI) CA, be it that perhaps two of these might
> not work with at least Chrome.
>

The WebPKI is the universe of CAs that issue certs that browsers trust.
They don't care about anything outside that.

>
> Otherwise, libraries used for more than browservers may well have to
> implement the proposed ugly work-arounds.
>
> --
>     Viktor.
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to