Salz, Rich wrote:
[ Charset windows-1252 unsupported, converting... ]
> > There is some wording in PKIX and X.509 which creates the impression that a
> > CA could be re-using the same Subject DName with different keys, but such
> > an interpretation is a formally provable defect of the PKIX specification.
> 
> Any links you can point to?
> 
> I don't see how CA1 issuing a sub-ca for "... CN=fred" can globally prevent 
> CA2 from issuing a sub-ca with the exact same DN.  Can you explain what I am 
> missing?
 
Such an action will create two mutually exclusive PKIs, PKIs that
are *NOT* allowed to ever be bridged.  Bridging them or would open security
problem in the design of CRL processing rules for a collision
of distinct subCA names, because those rules say that a signature on
a CRL is valid, if the CRL signer cert can be verified under the same
root as the CA.


PKIX (rfc5280) about AuthorityKeyIdentifier X.509v3 extension:

https://tools.ietf.org/html/rfc5280#section-4.2.1.1

   The keyIdentifier field of the authorityKeyIdentifier extension MUST
   be included in all certificates generated by conforming CAs to
   facilitate certification path construction.

While it is a requirement for conforming CAs to place AuthorityKeyIdentifiers
into issued certificates, using it for building or verifying certificate
chains by RPs is purely optional "faciliate".

If re-using the same CA DName for certs with different keys would be allowed,
then chain building and chain verifying would become *DESPERATELY* dependent
on support *AND* use of AuthorityKeyIdentifier->SubjectKeyIdentifier.

-Martin


PS:

Coincidentally, this also implies that "self-issued" (rather than self-signed)
certificates are a "myth".  While they can be created technically, they are
*ALWAYS* in violation of requirements of the specification(s).  

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to