On 2016-09-25 23:23, David Benjamin wrote:
Do you mean in RSA SubjectPublicKeyInfos? For those, such encodings are
not actually standards-compliant. Per RFC 3279, 2.3.1:

   The rsaEncryption OID is intended to be used in the algorithm field
   of a value of type AlgorithmIdentifier.  The parameters field MUST
   have ASN.1 type NULL for this algorithm identifier.

https://tools.ietf.org/html/rfc3279#section-2.3.1

Then again, the ASN.1 module in https://datatracker.ietf.org/doc/rfc5280/ says differently. Strictly speaking, RFC 3279 does not override the PKIX specification when it comes to X.509 certificates; only for formats such as RSA PUBLIC KEY that rely solely on the ASN.1 module in RFC 3279.


There are other contexts where (due to historical mistakes) specs
declared both are acceptable, but amazingly not RSA SPKIs. BoringSSL has
enforced it for quite some time now, so it seems this part of the
specification matches reality. If I recall, mozilla::pkix enforces this
as well?

Actually no, just tested Chrome v53 and Firefox v49 for the Windows platform. Only Chrome fails when connecting to a server that presents a server certificate with the NULL parameters omitted from the DER encoding.

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to