On Fri, Jun 20, 2025 at 04:16:57PM +1000, Viktor Dukhovni wrote:

> > Does Google's change break previously-working use cases?
> 
> Yes.  Let's Encrypt intermediate issuers no longer vend EE certs with a
> "clientAuth" EKU.

Well, actually, perhaps that hasn't happened quite yet.  One of my
server certs contains:

    # openssl x509 -in $certfile -noout -text -certopt 
no_header,no_sigdump,no_pubkey,no_subject,no_serial,no_version | head
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=US, O=Let's Encrypt, CN=R10
        Validity
            Not Before: Jun 17 01:08:52 2025 GMT
            Not After : Sep 15 01:08:51 2025 GMT
        X509v3 extensions:
            X509v3 Key Usage: critical
                Digital Signature, Key Encipherment
            X509v3 Extended Key Usage:
                TLS Web Server Authentication, TLS Web Client Authentication

The relevant language in the Chrome program states:

    
https://googlechrome.github.io/chromerootprogram/#321-applicant-pki-hierarchies

    The Chrome Root Program will only accept CCADB Root Inclusion
    Requests from Applicant PKI hierarchies that are dedicated to TLS
    server authentication certificate issuance.

    To qualify as a dedicated TLS server authentication PKI hierarchy
    under this policy:

    1. All corresponding unexpired and unrevoked subordinate CA
       certificates operated beneath an applicant root CA MUST:

        o when disclosed to the CCADB…

            * prior to June 15, 2025, include the extendedKeyUsage extension
              and (1) only assert an extendedKeyUsage purpose of
              id-kp-serverAuth OR (2) only assert extendedKeyUsage purposes
              of id-kp-serverAuth and id-kp-clientAuth.
            * on or after June 15, 2025, include the extendedKeyUsage
              extension and only assert an extendedKeyUsage purpose of
              id-kp-serverAuth.

        o NOT contain a public key corresponding to any other unexpired
        or unrevoked certificate that asserts different extendedKeyUsage
        values.

    2. All corresponding unexpired and unrevoked subscriber (i.e., TLS
       server authentication) certificates MUST include the
       extendedKeyUsage extension and only assert an extendedKeyUsage
       purpose of id-kp-serverAuth.

The R10 issuer was surely "disclosed to the CCADB" well before the June
15th date, and its EKU has:

    $ openssl x509 -in leca/r10.pem -text -certopt 
no_header,no_serial,no_version,no_pubkey,no_signame | head
        Issuer: C=US, O=Internet Security Research Group, CN=ISRG Root X1
        Validity
            Not Before: Mar 13 00:00:00 2024 GMT
            Not After : Mar 12 23:59:59 2027 GMT
        Subject: C=US, O=Let's Encrypt, CN=R10
        X509v3 extensions:
            X509v3 Key Usage: critical
                Digital Signature, Certificate Sign, CRL Sign
            X509v3 Extended Key Usage:
                TLS Web Client Authentication, TLS Web Server Authentication

So the issuer qualifies under point "1", but point "2" was not yet met
on June 17th.  Does someone have a date for when/whether LE will tow the
line on point 2?

-- 
    Viktor.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to