Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x509 verification fails on critical EKU #11163

Closed
nbastin opened this issue Jun 25, 2024 · 3 comments
Closed

x509 verification fails on critical EKU #11163

nbastin opened this issue Jun 25, 2024 · 3 comments
Labels

Comments

@nbastin
Copy link
Contributor

nbastin commented Jun 25, 2024

If any certificate in the verification chain has a critical EKU, verification will fail. RFC 5280 (and X.509 in general) allows EKU to be either critical or non-critical for any certificate. I've attached a test script and 2 different sets of certs (one that works, one that fails). Both sets pass openssl verify -x509_strict.

The script takes the root cert as the first argument (-cacert.pem) and the to-be-verified client cert as the second (-testuser-cert.pem).

pyca_test.tar.gz

@alex alex added the x509 label Jun 26, 2024
@alex
Copy link
Member

alex commented Jun 26, 2024 via email

@alex
Copy link
Member

alex commented Jun 26, 2024

I did miss it, see https://cabforum.org/working-groups/server/baseline-requirements/requirements/#71276-subscriber-certificate-extensions

So this is a feature request to allow loosening this requirement.

@alex
Copy link
Member

alex commented Jul 5, 2024

Closing in favor of #11165 which tracks this more broadly.

@alex alex closed this as completed Jul 5, 2024
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Oct 4, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Development

No branches or pull requests

2 participants