Ok.

RFC 5820 is clear (not necessarily cristal clear) but anyway:

1: Read the introduction about extensions. In short and by doing some boolean 
logic manip:

If you know how to treat an extension, the criticality bit is irrelevant for 
the verification.
Since the implementation in question knows about BC, it should never ever look at the critbit in *ANY* cert. It just looks whether it is a CA, and if path length is ok.

2: The verification algorithm is outlined in detail. Look at the input. It is basically a public key+algo + an identity. Not a cert. No extensions, etc.

One  should be able to use X509 version 1 cert as a container for the root 
pubkey.

On 10/12/2023 04:17, Phil Smith III wrote:
Peter Sylvester wrote, in part:

T
what is suggesting this?

If by "this" you mean "what is suggesting 'But this doesn't seem to be true until we 
add the TLSv1.3 support'" then it's that the old version, which doesn't do TLSv1.3, didn't get 
the BC error with the
You wrote that there is a suggesting to reject non-pkix conformant certs. Where is that? Not in the path verification.
Does you product work with TLS 1.2?
Yes. Has for years. Both old and new versions.

Good.

So to recap, my perception is that if the client doesn't say "I can do 
TLSv1.3", BC doesn't matter; if it does say so, BC matters.

I think you should ask IBM about this change in behaviour.

I have not followed the CA forum btw. I prefer to go to the beach (200m)  or 
the alpes (25km) :-)

best

Peter


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to