Hello,

Unfortunately, I don’t think that the CABF BRs or other CABF documents will 
provide much insight here; they mainly just say that CAs MUST include EKUs in 
CA certificates. Instead, I’d recommend starting with reading this discussion 
on m.d.s.p., which prompted the “EKU chaining” rules that we know today: 
https://groups.google.com/g/mozilla.dev.security.policy/c/0jnELviAxxo/m/VF1564nFcgwJ.
 

As for some inspiration on how to write the path validation procedure, I 
recommend taking a look at Russ Housley’s (expired) I-D on the EKU Constraints 
extension: 
https://datatracker.ietf.org/doc/html/draft-housley-spasm-eku-constraints-01. 
This extension was not standardized, but the way that Russ presents the 
algorithm could likely be reused for this draft.

 

Thanks,

Corey

 

From: TLS <tls-boun...@ietf.org> On Behalf Of Salz, Rich
Sent: Saturday, January 28, 2023 10:57 AM
To: Oleg Pekar <oleg.pekar.2...@gmail.com>; Carl Wallace 
<c...@redhoundsoftware.com>
Cc: TLS@ietf.org
Subject: Re: [TLS] Regulations for EKU validation for CA certificates in the 
certificate chain

 

Great, I will prepare the initial draft then. Are there any informal documents 
where WebPKI rules are captured?  

 

I would start by looking at the CA/Browser forum documents.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to