Great, I will prepare the initial draft then. Are there any informal documents where WebPKI rules are captured?
>a new flag for the path validation algorithm that signifies WebPKI EKU processing is in effect Do you mean a flag that one party presents to the other party as an indication that it expects from the other party the following: all other party's CA certificates in the chain must have the relevant EKU purpose? On Sat, Jan 28, 2023 at 4:05 PM Carl Wallace <c...@redhoundsoftware.com> wrote: > > > On 1/28/23, 8:10 AM, "TLS on behalf of Ilari Liusvaara" < > tls-boun...@ietf.org <mailto:tls-boun...@ietf.org> on behalf of > ilariliusva...@welho.com <mailto:ilariliusva...@welho.com>> wrote: > > > On Sat, Jan 28, 2023 at 11:57:46AM +0200, Oleg Pekar wrote: > <snip> > > > Example: if the client sends a chain Root->CA1->CA2->End-Entity, then the > > End-Entity certificate, if EKU is present in it, must include > > EKU=clientAuth. But Root, CA1, CA2 can have EKU=serverAuth (and don't > > include EKU=clientAuth at all). Such a chain would be considered valid > from > > the RFC perspective, nevertheless it is counter-intuitive. Due to this > > potential gap some implementations (including OpenSSL) apply the same > > validation rules for client end-entity certificate to client's chain CA > > certificates and this creates incompatibility between implementations. > > > > * Am I missing a standard that explicitly regulates EKU for CA > certificates > > in the party's chain? > > > The standard interpretation in WebPKI is that EKU of CA certificates > does matter, and I guess this has spilled over to a number of non-Web > TLS implementations. > > [CW] A short RFC that describes WebPKI EKU processing rules along with a > new flag for the path validation algorithm that signifies WebPKI EKU > processing is in effect may help clarify the situation. Implementations > that use WebPKI EKU rules would claim conformance to the new RFC, which > would be a superset of 5280. > > > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls >
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls