Salz, Rich wrote:
>
>> The certificate should have its own DN, use that.
> 
> She's saying that it *doesn't.*
> 
> SubjectDN is not unique.  IssuerDN/Serial is unique, but this extension use 
> that.

SubjectDN of a *Certificate Authority* **MUST** be unique.

There is some wording in PKIX and X.509 which creates the impression
that a CA could be re-using the same Subject DName with different keys,
but such an interpretation is a formally provable defect of the PKIX
specification.

Creating a certificate chain *MUST* be possible on the issuer name->
subject name chaining alone.  Support for chaining by subjectKeyId
is truely *OPTIONAL* based on the requirements in the specification,
so reuse of the same DName with a different key would break certificate
chaining (and verification) that is performed on the issuer->subject
chain alone and is therefore prohibited.

Support for the SubjectKeyIdentifier and AuthorityKeyIdentifier
X.509v3 extensions is explicitly just *RECOMMENDED* and can therefore
be absent from a perfectly PKIX-conforming minimum requirements RP.
PKIX-conforming CA MUST NOT break minimum-requirements RPs, e.g.
by creating/issuing CA certificates with identical subject names but
different public keys. 

-Martin

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to