Great, I will prepare the initial draft then. Are there any informal
documents where WebPKI rules are captured?

>a new flag for the path validation algorithm that signifies WebPKI EKU
processing is in effect
Do you mean a flag that one party presents to the other party as an
indication that it expects from the other party the following: all other
party's CA certificates in the chain must have the relevant EKU purpose?

On Sat, Jan 28, 2023 at 4:05 PM Carl Wallace <c...@redhoundsoftware.com>
wrote:

>
>
> On 1/28/23, 8:10 AM, "TLS on behalf of Ilari Liusvaara" <
> tls-boun...@ietf.org <mailto:tls-boun...@ietf.org> on behalf of
> ilariliusva...@welho.com <mailto:ilariliusva...@welho.com>> wrote:
>
>
> On Sat, Jan 28, 2023 at 11:57:46AM +0200, Oleg Pekar wrote:
> <snip>
>
> > Example: if the client sends a chain Root->CA1->CA2->End-Entity, then the
> > End-Entity certificate, if EKU is present in it, must include
> > EKU=clientAuth. But Root, CA1, CA2 can have EKU=serverAuth (and don't
> > include EKU=clientAuth at all). Such a chain would be considered valid
> from
> > the RFC perspective, nevertheless it is counter-intuitive. Due to this
> > potential gap some implementations (including OpenSSL) apply the same
> > validation rules for client end-entity certificate to client's chain CA
> > certificates and this creates incompatibility between implementations.
> >
> > * Am I missing a standard that explicitly regulates EKU for CA
> certificates
> > in the party's chain?
>
>
> The standard interpretation in WebPKI is that EKU of CA certificates
> does matter, and I guess this has spilled over to a number of non-Web
> TLS implementations.
>
> [CW] A short RFC that describes WebPKI EKU processing rules along with a
> new flag for the path validation algorithm that signifies WebPKI EKU
> processing is in effect may help clarify the situation. Implementations
> that use WebPKI EKU rules would claim conformance to the new RFC, which
> would be a superset of 5280.
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to