[{"author": "Alan DeKok", "text": "

Looks like a small (but hopefully dedicated) crowd. :)

", "time": "2022-07-27T19:00:05Z"}, {"author": "Jan-Frederik Rieckers", "text": "

@meetecho can you pan the camera?

", "time": "2022-07-27T19:06:32Z"}, {"author": "Jonathan Hammell", "text": "

draft-ietf-tls-external-psk-importer has recently been published as RFC 9258

", "time": "2022-07-27T19:16:11Z"}, {"author": "Hazel Smith", "text": "

Unsure if the echo is from in the room, but it's still pretty bad

", "time": "2022-07-27T19:31:54Z"}, {"author": "Deb Cooley", "text": "

definitely feedback in the room....

", "time": "2022-07-27T19:35:56Z"}, {"author": "Deb Cooley", "text": "

Meetecho is here, though

", "time": "2022-07-27T19:36:05Z"}, {"author": "Hazel Smith", "text": "

Presumably certificates from WebPKI are only useful if you have a subject domain name that you can somehow trust is \"appropriate\" for the network (or is at least shown to the user, so they can decide if joining a network with domain name \"totallyrealtelco.geocities.com\" is for them or not)?

", "time": "2022-07-27T19:37:39Z"}, {"author": "Alan DeKok", "text": "

EAP-TLS typically used already with certificates from webPKI

", "time": "2022-07-27T19:44:49Z"}, {"author": "Alan DeKok", "text": "

which then means that the certificate contains a domain, which is sent to the EAP peer in a TLS exchange

", "time": "2022-07-27T19:45:17Z"}, {"author": "Hazel Smith", "text": "

Yeah, quite. I guess I simply meant that whatever CA you use, the client needs some way to decide whether it \"likes\" the domain name presented? (Is that shown to the user? Is that an administrator-configured thing? Is it more like a \"the domain just has to be consistent from step to step in the process\" thing?

\n

(Sorry if the question is overly naive here.)

", "time": "2022-07-27T19:46:35Z"}, {"author": "Alan DeKok", "text": "

That would be nice, but domain name verification is poorly done in EAP. Largely it's \"trust server certs from this CA\". Any information about the certs is well hidden from the user :(

", "time": "2022-07-27T19:48:49Z"}, {"author": "Alan DeKok", "text": "

some suppliants support configuration which says \"server cert must have subjectAltName from domain example.com\", but not every one supports that

", "time": "2022-07-27T19:49:43Z"}, {"author": "Hazel Smith", "text": "

Yeah :(

\n

(At the university I used to work at, we had a \"$universityname-wifi-setup\" network that basically captive-portal-redirected you to a page with some provisioning config files and/or tools for Android/IOS/WIndows/Linux/MacOS and you basically just had to satisfy yourself that you were happy downloading these files/programs from wifisetup.$universityname.ac.uk)

", "time": "2022-07-27T19:50:30Z"}, {"author": "Deb Cooley", "text": "

Is that the usability document?

", "time": "2022-07-27T19:52:04Z"}, {"author": "Alan DeKok", "text": "

yes

", "time": "2022-07-27T19:52:09Z"}, {"author": "Alan DeKok", "text": "

I would like implementors to correctly implement existing EAP methods first :)

", "time": "2022-07-27T19:52:54Z"}, {"author": "Jan-Frederik Rieckers", "text": "

+1 for certificate guidelines

", "time": "2022-07-27T19:53:54Z"}]