Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Need for certificate profile identifier in Sign Requests #93

Open
Razumain opened this issue Sep 6, 2019 · 3 comments
Open

Need for certificate profile identifier in Sign Requests #93

Razumain opened this issue Sep 6, 2019 · 3 comments

Comments

@Razumain
Copy link
Member

Razumain commented Sep 6, 2019

There is a need for a list of certificate profile indicators to guide the Signing service on what information that needs to be in the signing certificate.

An example is if the signing service is used to sign a TrustedList. The specifications for EU trusted lists requires certain information such as a special extended key usage (EKU). Similar cases exists where the signing certificate need to be adapted to certain format requirements beyond what current protocol can handle.

The proposed solution is to add a sequence of profile identifiers where each identifier may have a set of key, value pair properties. We must assume that each profile identifier need to specify certain parameters specifying certain values or options.

@martin-lindstrom martin-lindstrom added this to To do in Post June 2018 via automation Sep 6, 2019
@GunnarKlintberg
Copy link

I don’t disagree on the enhancement, but I don’t for the moment with only this enhancement alone to improve the real use case by the current implementation we have at governments in Sweden.
From a prioritizing point of view, I see other enhancement more important than this.
We do not have requests by our end clients to implement this and the described use case seems to be a real special case that does not hit the normal end client’s implementation.

In combination with other enhancement that is not today listed I defiantly see use cases for this.
Example, how to solve organization signature that the Standard is lacking on.
In that use case this can be one of the needed puzzle pieces.
But from a generic PKI point of view, we do not like to have different certificate profiles from the same CA if it not really needed (in some cases it is necessary).
Historically we have run over too many implementations when the Subscriber that verify the Certificates does not do this correctly.

@martin-lindstrom
Copy link
Member

Moving this to the next version.

@martin-lindstrom martin-lindstrom added this to To Do in Post Jan 2020 via automation Jan 13, 2020
@martin-lindstrom martin-lindstrom removed this from To do in Post June 2018 Jan 13, 2020
@martin-lindstrom
Copy link
Member

Will be done in version 2 of the signature specs.

@martin-lindstrom martin-lindstrom removed this from To Do in Post Jan 2020 Oct 29, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

3 participants