On 28/05/14 15:13, Salz, Rich wrote:
The signature on a certificate is made using the key of its parent CA. So that 
means that the parent CA uses an RSA key and not an ECDSA key.

I thought the spec says the cert should be signed with the same key type.  Not 
sure which spec, sadly. :(  And that consensus was that this is a mistake.

Hi Rich.

RFC4346 (TLS 1.1) Section 7.4.2 says...
  "Unless otherwise specified, the signing algorithm for the
   certificate MUST be the same as the algorithm for the certificate
   key."

(RFC2246 (TLS 1.0) says the same, except the MUST is not capitalized)

RFC4492 (ECC Cipher Suites for TLS) says...
"2.2.  ECDHE_ECDSA
   In ECDHE_ECDSA, the server's certificate MUST contain an ECDSA-
   capable public key and be signed with ECDSA."

RFC5246 (TLS 1.2) Section 7.4.2 says...
  "Note that this implies that a certificate containing a key for one
   signature algorithm MAY be signed using a different signature
   algorithm (for instance, an RSA key signed with a DSA key).  This is
   a departure from TLS 1.1, which required that the algorithms be the
   same."

So the "same key type" rule only applies to TLS <=1.1. I'm not aware of any implementation that actually enforce this rule though.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to