On 26/02/14 16:58, Paul Hoffman wrote:
RFC 4211 is also somewhat ambiguous. It says:

    CertTemplate ::= SEQUENCE {
       version      [0] Version               OPTIONAL,
       serialNumber [1] INTEGER               OPTIONAL,
       signingAlg   [2] AlgorithmIdentifier   OPTIONAL,
       issuer       [3] Name                  OPTIONAL,
       validity     [4] OptionalValidity      OPTIONAL,
       subject      [5] Name                  OPTIONAL,
       publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,
       issuerUID    [7] UniqueIdentifier      OPTIONAL,
       subjectUID   [8] UniqueIdentifier      OPTIONAL,
       extensions   [9] Extensions            OPTIONAL }

And:

       serialNumber MUST be omitted.  This field is assigned by the CA
       during certificate creation.

       signingAlg MUST be omitted.  This field is assigned by the CA
       during certificate creation.

If it "MUST be omitted", it is not optional. So, a document updating RFC 4211 
to fix this error, at least for the limited use of CT, seems fine.

Can a CA private key sign a CertTemplate structure?
Or rather, could RFC5280-compliant software verify a CA-signed CertTemplate if the corresponding CA certificate has the keyCertSign Key Usage bit set but _not_ the digitalSignature bit set?
I don't think it could.

So, I think we'd have to update RFC5280 - relaxing some of the Key Usage rules - in order to permit the RFC4211 CertTemplate structure to be used for Precertificates.

And if we're going to update RFC5280, surely the simplest update would be to permit an RFC6962-compliant Precertificate/Certificate pair to share the same serial number?

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to