Hi there:

PMHager wrote:
> Correct, as I already denoted these are from the obsolete RFC2459.
> 
> As the IETF/PKIX charter could not define a consenting set of flags, 
> Steve Kent had suggested to drop them and leave it to the IPsec WG. 
> This has been done by RFC4809: Its recommendation is not to use any 
> extKeyUsage and, if necessary now to use: 
> 
>    id-kp-ipsecIKE OBJECT IDENTIFIER ::= { id-kp 17 }
> 
> As RFC4809 just over 2 years old and till now its OID is not in the 
> databases from Alvestrand or the ITU, it is very likely that products 
> in the field still support the former ones. This is ok, as long as 
> it is done in conformance with X509's extKeyUsage definition: 
> 
> If the extension is flagged critical, then the certificate 
> shall be used only for one of the purposes indicated. 
> 
> If the extension is flagged non-critical, then it indicates 
> the intended purpose or purposes of the key, and may be used 
> in finding the correct key/certificate of an entity that has 
> multiple keys/certificates...
> 

Be *VERY* careful with this interpretation - RFC5280 states for EKU:

"If the extension is present, then the certificate MUST only be used
for one of the purposes indicated."

Thus removing the X.509 restriction for constraining based on
criticality - if you are going to conform to RFC5280, then the mere
presence of an EKU constrains the usage of that particular certificate.

Have fun.

Patrick.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to