"Dr. Stephen Henson" writes: > > 3. If there is no reference test suite available, should it be assumed > > that there exists no tested, and, therefore with high probability no > > correct, implementation of the certification path validation algorithm > > which handles the policy mappings and name constraints ? > > > > There was some debate about how some options in name constraints should be > interpreted in the PKIX mailing lists not long ago. This suggests that > "correct" may be subject to interpretation :-) > > I've never seen a certificate with either name or policy constraints in the > field or indeed privately. Examples would be useful to check out any future > OpenSSL support for them.
About DPD/DPV: the outcome of this strawpoll http://www.imc.org/ietf-pkix/mail-archive/msg05500.html certainly has implications for this problem. (The immediate implication has been a lot of strawpoll vote message on the pkix mailing list :^) I'm not sure about name constraints options, but there is a recent thread -- December time frame -- about the meaning of the policy extensions. There seem to be a variety of problems here, ranging from "how many policy oids can a cert have", to what this extension means in a CA signing cert (does it describe what policy this CA signs? or under what policy this cert itself was signed? Can it mean both &c). http://www.imc.org/ietf-pkix/mail-archive/msg05207.html Name constraints, because it was set to critical in the PKIX profile, is probably dead. There is very little support for it in the SSL-using universe: openssl doesn't support it at all, except to reject certs that use it; IE may be doing something useful with it in recent versions; no Netscape-ish related browser that I know of does anything useful with it but at least some Mozilla based ones will reject these certs (probably depends on maturity of NSS). This profile has been around since Jan 1999 and this feature is still not widely available. It's quite easy to create certs with name constraints of various types. iPlanet/Netscape CMS support creating them. I believe Microsoft Certificate Services have templates that support this now. The problem is, they are useless to most of us. I have tried to get some examples of this from the US Fed. bridge PKI members, but this has not proved successful. (Presuming, of course, that they do in fact employ them.) There are many certs in production use with policy extensions; the VeriSign end entity certs should provide many examples. I have been intermittently collecting examples of certificates in order to learn industry best practices (and illuminate areas of PKIX or related profiles that are unclear to me). This was for the benefit of computing Grids, look here: http://caops.es.net/ or here for the data: http://caops.es.net/Documents/GGFV/Certificate_Profile.pdf I think enough data has been collected, and intend to push for some discussion on extensions we need/need to avoid & relegate the data to an appendix. If someone wants to contribute to this in some way (discussion, more certificate data &c) please feel free to get in touch with me or get involved in gridforum. Thanks, ==mwh Michael Helm ESnet/LBNL ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]