<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Apr 29, 2021 at 4:58 PM Kurt Roeckx <<a href="mailto:kurt@roeckx.be">kurt@roeckx.be</a>> wrote:</div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
id-kp-clientAuth is defined as "TLS WWW client authentication",<br>
but it's also being used for things that are not related to www.<br>
It would be better that for server to server authentication, you<br>
create a new EKU, and that it's specific to a certain use case.<br></blockquote><div><br>Very much, yes.</div><div><br></div><div>This applies whether you're using a PKI special for your trust framework (definitely, the recommended approach, same as you would use a separate PKI for, say, passport issuance) or you're using a generic PKI. The combination of both a distinct, per-trust framework EKU and certificatePolicy OID, together, are necessary to ensure solid and secure technical implementation. </div></div></div>