Since we're talking about bare public keys / not verifying certificates
again, a brief reminder:

https://tools.ietf.org/html/draft-barnes-dane-uks-00

On Wed, Aug 22, 2018 at 12:49 AM Peter Gutmann <pgut...@cs.auckland.ac.nz>
wrote:

> Viktor Dukhovni <ietf-d...@dukhovni.org> writes:
>
> >Some DANE users have reached similar conclusions, though a bit of ASN.1
> >parsing is still required to "seek" to the SPKI, which is not at a fixed
> >offset in the certificate.
>
> It's actually much simpler than that because you've got a nice unique byte
> string, the OID, in front of the key.  My code jumps 64 bytes in and then
> scans from there looking for the byte string corresponding to SEQUENCE {
> RSA
> OID, NULL }.  What follows is the public key, you skip the wrapper bytes
> and
> grab the two integer values that follow.
>
> >  41   32:     SEQUENCE {
> >  43   13:       UTCTime 27/07/2014 14:59:59 GMT
> >  58   15:       GeneralizedTime 27/11/3013 14:59:59 GMT
> >         :       }
>
> Yeah, seen those sorts of things too, my code has special-case handling to
> clip validTo at 32-bit INT_MAX - 1 if it sees long lifetimes (getting
> pedantic, it's actually 2036 since some embedded libraries have problems
> with
> time_t values too close to INT_MAX).
>
> >It does not stricly comply with RFC5280, which forbids empty RDN sequences
> >for the issuer field, but this does not seem to be a problem in practice.
>
> Yup.  If all you're doing is a string search for the RSA OID, no-one cares
> what else is or isn't present.
>
> Peter.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to