On 1/28/23, 8:10 AM, "TLS on behalf of Ilari Liusvaara" <tls-boun...@ietf.org 
<mailto:tls-boun...@ietf.org> on behalf of ilariliusva...@welho.com 
<mailto:ilariliusva...@welho.com>> wrote:


On Sat, Jan 28, 2023 at 11:57:46AM +0200, Oleg Pekar wrote:
<snip>

> Example: if the client sends a chain Root->CA1->CA2->End-Entity, then the
> End-Entity certificate, if EKU is present in it, must include
> EKU=clientAuth. But Root, CA1, CA2 can have EKU=serverAuth (and don't
> include EKU=clientAuth at all). Such a chain would be considered valid from
> the RFC perspective, nevertheless it is counter-intuitive. Due to this
> potential gap some implementations (including OpenSSL) apply the same
> validation rules for client end-entity certificate to client's chain CA
> certificates and this creates incompatibility between implementations.
> 
> * Am I missing a standard that explicitly regulates EKU for CA certificates
> in the party's chain?


The standard interpretation in WebPKI is that EKU of CA certificates
does matter, and I guess this has spilled over to a number of non-Web
TLS implementations.

[CW] A short RFC that describes WebPKI EKU processing rules along with a new 
flag for the path validation algorithm that signifies WebPKI EKU processing is 
in effect may help clarify the situation. Implementations that use WebPKI EKU 
rules would claim conformance to the new RFC, which would be a superset of 5280.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to