Welcome to the wonderful world of NTP Autokey.
Where they misuse X509v3 extensions for their own purposes.

Nothing I can do about it. It's in the specification of that RFC (5906)


On Thu, Nov 28, 2013 at 4:14 PM, Erwann Abalea
<erwann.aba...@keynectis.com>wrote:

>  How nice, they're asking for a self-signed certificate to include a
> specific EKU to indicate it's a Trust Anchor, and the OID used for this has
> never been allocated. Crazy.
>
> I just looked at OpenSSL's objects.txt database, and found some OIDs that
> need some change:
>
> id-pkix-OCSP 8            : extendedStatus    : Extended OCSP Status
> should be "id-pkix-ocsp-pref-sig-algs" (RFC6960).
>
> id-pkix-OCSP 9            : valid
> should be id-pkix-ocsp-extended-revoke (RFC6960).
>
> id-pkix-OCSP 10           : path
> id-pkix-OCSP 11           : trustRoot             : Trust Root
> have never been defined by PKIX.
>
> RFC5906 uses a "trustRoot" EKU, without any OID being proposed or
> referenced. Your certificate includes the later one in the EKU extension.
>
> --
> Erwann ABALEA
>
>
> Le 28/11/2013 14:26, Dereck Hurtubise a écrit :
>
>    It is NTP indicating that this certificate is held by a supposed
> trusted root (authority).
>  This is NTP's way of figuring out if the certificate of the
> subject/issuer should be trusted or not.
>
>  So they misuse X509 extensions for their own purposes.
>
>  This alone is not enough.
> So they also implement a challenge/response scheme that they do after the
> certificates are verified.
>
>  Read RFC 5906 (autokey) on the CERT message/exchange for more information
> and why they do this.
>  The Trust Root is used in the identity exchange scheme after the CERT
> exchange. Also in the RFC.
>
>
> On Thu, Nov 28, 2013 at 2:07 PM, Walter H. <walte...@mathemainzel.info>wrote:
>
>> Hi,
>>
>> On Wed, November 27, 2013 16:02, Dereck Hurtubise wrote:
>> >             X509v3 Extended Key Usage:
>> >                 Trust Root
>>
>>  what is this strange?
>> 'Trust Root' as "Extended Key Usage"?
>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>
>
>

Reply via email to