On Tue, Mar 25, 2014 at 10:54 AM, Erwann Abalea
<erwann.aba...@keynectis.com> wrote:
>
>> 2. I couldn't figure out what the [additional_oids] section of the
>> Expert example's root-ca.conf file is for - either through research or
>> going through the commit history.  Could you elaborate on what that
>> accomplishes?
>>
>> https://pki-tutorial.readthedocs.org/en/latest/expert/root-ca.conf.html
>
> The OIDs are used in the CertificatePolicies extension of a subordinate CA
> of this root CA.
> For a policyId to be acceptable for an end-user certificate, this same
> policyId (or the special value anyPolicy) MUST be present in all CAs between
> this end-user cert and the root CA. The root CA is special in that it
> doesn't need to contain any CertificatePolicies extension.

So these are used to group or link the certificate chain together?

Is there guidance for generating and naming this OID? Given an OID in this form:

1.3.6.1.4.1.X.Y.Z

I'm assuming that you would register the top level number (X) with the
IANA (or other appropriate issuing body), but is there guidance to
setting Y and Z, which are 7 and 8 or 9 respectively in the Expert
example?

>> 3. Is there a reason to not set a pathLen in the basicConstraints
>> section of the Root CA's (to 1, to allow a maximum of one layer of
>> CA's below the Root), but to do so on the Intermediate CA's?
>
> Because it's not used by the standardized validation algorithm (RFC5280
> section 6, X.509 section 10).

I looked through RFC5280 section 6.1.4 (m), and it appears that
setting the pathLen would apply to the Root CA, and would cause
section (l) to fail on CA's created beyond the depth specified.  Am I
interpreting the RFC incorrectly?

Thanks,
Zack
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to