Is it possible to limit the CA to only cover certain domain, e.g. *.yourown.home.arpa? Or is it the case that if you install a CA of your friend, it grants them the possibility of MitMing most any service (with non-pinned cert), at least when enabled by network topology?
I've been using a local CA for a long time, but I have not found a way to limit it that way, so security-wise it is less than optimal.
Friends don't ask friends to install their custom root CA. If someone asked you to install theirs, would you?
After all, once they've installed your root CA, you'll now be able to trivially intercept all of their encrypted HTTPS communications while they use your network. I wouldn't trust my mother with that power.
Specifically, what I mean is, if you have house guests that care enough about your LAN that they actually want to access any of the services you have running on it – it shouldn't be difficult to explain to them why and how to trust your CA.
The main difficulty IME is getting any of your guests to care about your LAN services in the first place.
I'm sorry, but if you ask me to install your private CA on any of my devices... I would politely tell you to stop.
As for house guests, I really like what OnHub did - you could allow anyone to network to control certain IoT devices. When someone was house sitting for me, they could have control thermostat, lights, etc from their phone without any apps or "add household member" shenanigans.
> allow anyone to network to control certain IoT devices
Yeah that makes sense :)
My own house is not really IoTified yet. I have a single "smart" plug that I can turn on or off with an app that the night table lamp on one side of the bed is plugged into. But I could see the appeal of having the IoT setup accessible to guests for people that have more IoT stuff in their house.
When you're a guest at a friend's house, for example, you would have no problem installing their root CA in exchange for the privilege of using their network? Wouldn't you find that to be a little bit antisocial or overbearing?
Sure I can. It's my network, so I decide what root CAs are trusted. Be your own CA, and tell your computers to trust your own CA cert.
For example:
https://smallstep.com/blog/build-a-tiny-ca-with-raspberry-pi...
or
https://github.com/jsha/minica