On 06/09/2015 07:21 AM, Sean Mullan wrote:
-Bcc jdk9-dev

This question is more appropriate for security-dev, so I am copying that
list for further discussion.

--Sean

On 06/09/2015 02:21 AM, Vyronas Tsingaras wrote:
Hi all,

I work for the Hellenic Academic and Research Institutions
Certification Authority (https://www.harica.gr), a Root Certification
Authority included in the NSS, Microsoft and Apple certificate stores.
Our RootCA certificate uses the name constraints extension with a
small error, instead of just gr, org and edu in the permitted subtrees
it has .gr, .edu and .org. As a result certificates issued under our
CA fail to verify with Java. We had the same issue with OpenSSL and
gnuTLS but fortunately they modified their implementation to
accommodate for our situation. I kindly ask if this is something that
could also be done with OpenJDK, and if so what would be the best way
to implement that. Currently we have a patch against the 'constrains'
method of 'DNSName' that just ignores the leading dot in name
constraints.

We don't make exceptions for cases like this, as it is not compliant with RFC 5280. However, are the name constraints only on the root certificate? When specified this way, they are optional (see RFC 5280 section 6.2). Our implementation does not process them by default (you must specify them as an optional parameter to the TrustAnchor class). Are the name constraints included in other certificates chaining back to the root?

--Sean



Kind Regards,
Vyronas Tsingaras,
Aristotle University of Thessaloniki, IT Center

Reply via email to