nanog mailing list archives

Re: Massive change in Public Cert behaviour coming soon


From: Jay Acuna via NANOG <nanog () lists nanog org>
Date: Thu, 22 May 2025 15:36:30 -0500

On Thu, May 22, 2025 at 2:58 PM John Levine via NANOG
<nanog () lists nanog org> wrote:

It is my impression that the normal way to manage client certs is for the organization that
runs the servers to sign and distribute certs to the clients.  This isn't new.

Small private CAs per organization are perfect when the same organization runs
both client and server; such as client certificates for EAP-TLS with
802.1X wireless auth.

Software designed for client auth scenarios does not trust random
certificates from a
public CA. The cert has to allow the appropriate EKUs, but also it
must be manually
mapped to the active directory user by an admin, or be signed by a specific CA
which is configured on the server.

This does not work for applications where the client authentication is between
servers at different organizations.   Such as the SMTP server or Web
server which
wishes to connect to another company's SMTP server or Web server using
mutual TLS
to verify the web server FQDN for authentication to send mail or
access an API endpoint
as that server's identiy.

Companies are not going to add a million other companies' private CAs
to their system
trust roots list.  For the SMTP to SMTP  transport associations  the
two organizations may
barely know each other.    And the whole purpose of the public CAs is
to help establish
server authenticity for these kind of scenarios.

R's,
John
-JA
_______________________________________________
NANOG mailing list 
https://lists.nanog.org/archives/list/nanog () lists nanog org/message/LH75P74SZ6CMGYUBIGCN6S56PUOIWKBE/

Current thread: