+1.  I almost sent an e-mail largely saying the same over the weekend.

 

Russ’s draft had a flaw which he agreed to fix if there was further interest.  
And that never came about.  I do not exactly remember what the problem was, but 
I will be happy to review what the authors write to recall if the problem is 
applicable.  It related to edge cases of extension being absent or something of 
that nature.

 

From: TLS [mailto:[email protected]] On Behalf Of Carl Wallace
Sent: Tuesday, January 31, 2023 9:42 AM
To: Corey Bonnell <[email protected]>
Cc: [email protected]; Salz, Rich <[email protected]>
Subject: Re: [TLS] Regulations for EKU validation for CA certificates in the 
certificate chain

 

Good reference. That shows modifying initialization steps and using new 
variables. RFC5937 has an example of a new input flag. Between those two the 
basic skeleton is there. The effort just needs to make sure status quo is 
captured. 





On Jan 31, 2023, at 9:34 AM, Corey Bonnell <[email protected] 
<mailto:[email protected]> > wrote:



Hello,

Unfortunately, I don’t think that the CABF BRs or other CABF documents will 
provide much insight here; they mainly just say that CAs MUST include EKUs in 
CA certificates. Instead, I’d recommend starting with reading this discussion 
on m.d.s.p., which prompted the “EKU chaining” rules that we know today: 
https://groups.google.com/g/mozilla.dev.security.policy/c/0jnELviAxxo/m/VF1564nFcgwJ.

 

As for some inspiration on how to write the path validation procedure, I 
recommend taking a look at Russ Housley’s (expired) I-D on the EKU Constraints 
extension: 
https://datatracker.ietf.org/doc/html/draft-housley-spasm-eku-constraints-01. 
This extension was not standardized, but the way that Russ presents the 
algorithm could likely be reused for this draft.

 

Thanks,

Corey

 

From: TLS <[email protected] <mailto:[email protected]> > On Behalf Of 
Salz, Rich
Sent: Saturday, January 28, 2023 10:57 AM
To: Oleg Pekar <[email protected] <mailto:[email protected]> >; 
Carl Wallace <[email protected] <mailto:[email protected]> >
Cc: [email protected] <mailto:[email protected]> 
Subject: Re: [TLS] Regulations for EKU validation for CA certificates in the 
certificate chain

 

Great, I will prepare the initial draft then. Are there any informal documents 
where WebPKI rules are captured?  

 

I would start by looking at the CA/Browser forum documents.

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to