[caops-wg] [igtf-general] Re: Certificate Profile document updated (to v0.14)
David Groep
davidg at nikhef.nl
Thu Nov 2 11:29:37 CST 2006
Hi Mike, Kaspar, all,
Thanks for the comments, I've built v0.16 out of them.
[new versions on GridForge again v0.16:
https://forge.gridforum.org/sf/go/doc13741 (pdf)
https://forge.gridforum.org/sf/go/doc13742 (doc)]
Mike Helm wrote:
> I haven't had time to read the new draft but a couple comments at
> 2nd hand ...
>
> Kaspar Brand writes:
>
>>>recommendation. It used to be necessary to set pathlen=0 in the
>
>
> I said the wrong thing here - pathlen has to be undefined, or whatever
> "unlimited" is in asn.1. "0" probably has to be forbidden for Grid CAs;
> it disables old-style Grid proxy certs (we did this ca 2002).
That sounds gine -- and I now can happily undo most of the wording in
both section 2.4.1 (on CA certs) and just add a cautionary word in 3.3.1
that the pathLenConstraint MUST NOT be present, with a footnote explaining
that if you do it anyway, it MUST allow for an unlimited pathlen.
>>>that pathLenConstraint MUST be absent or set to 0. I did the same for
>>>end-entity certs, comments welcome on that!
>>
>>Setting pathlen to 0 in end-entity certs actually goes explicitly
>>against both RFC 3280 and the latest 3280bis I-D:
>>
>>
>>>CAs MUST NOT include the pathLenConstraint field unless the cA
>>>boolean is asserted and the key usage extension asserts the
>>>keyCertSign bit.
>>
>>In its current wording, 3.3.1 still gives the option of not including
>>pathlen at all (which is fine), but if we really want to allow the other
>>option (setting it to 0 for EE certs), then we should state that this
>>contradicts a mandatory requirement of RFC 3280 (similar to 3.2.1).
>
>
> Why would we want to set it for EE certs?
>
> The IETF PKIX profile for how path length is evaluated is in 4.2.1.10
> (about p 36)
This is now obsolete and removed from v0.16...
>>Second, two comments about authority and subject key identifiers -
>>section 2.4.6 currently states:
>>
>>
>>>2.4.6 Authority and Subject Key Identifier:
>>>A subjectKeyIdentifier extension MAY be included in CA certificates
>>>to aid in validation path construction. An authorityKeyIdentifier
>>>MAY be included in all CA certificates, except for selfsigned
>>>root certificates.
>>
>>The statement about the authorityKeyIdentifier is basically fine, but
>>the "except for selfsigned root certificate" poses a problem for a large
>>number of existing CA certs - when looking at the IGTF distribution
>
>
> Sure, ours does too. I don't understand this restriction - see the
> discussion in RFC 3280 4.2.1.1 - it's simply useless in the
> case of most self-signed CAs. RFC 3280 says
> "where ... [the CA has a] "self-signed" certificate, the authority key identifier
> MAY be omitted ....
>
> It's useless (I think) because disambiguation is not defined at the
> point in the chain of certs where you have a self-signed cert.
>
> The subject key & authority key ids should be identical in this case.
> (It might be useful to say, that if a self-signed CA cert presents
> an authority key id, it must be identical to the subject key id.)
Added text to that effect.
From Kaspar's mail:
>>If either of these extensions is included, it SHOULD
>>> include only the keyid attribute and no other attributes.
>
> "keyid" should be replaced by "keyIdentifier", that's the official RFC
> 3280 term ("keyid" is OpenSSL specific).
Done.
>>> Comment H12/H14: subjectKeyIdentifier and certificatePolicies MUST??
>>> not be critical
>>>
>>> I’ve seen no harm come from a sKI, but does all software actually
>>> parse it? I’m not sure that by making it critical we will not break
>>> things.
>
>
> For the subjectKeyIdentifier, I would change this (back) to MUST NOT,
> RFC 3280 states "Conforming CAs MUST mark this extension non-critical".
Changed back to be compliant to RFC3280 again.
Thanks!
DavidG.
--
David Groep
** National Institute for Nuclear and High Energy Physics, PDP/Grid group **
** Room: H1.56 Phone: +31 20 5922179, PObox 41882, NL-1009DB Amsterdam NL **
More information about the caops-wg
mailing list