openssl is flexible when verifying

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Apr 5, 2015 at 5:26 PM, Yuting Chen <chenyt at cs.sjtu.edu.cn> wrote:
> I checked some other certificates, and found that some non self-signed
> certificates having duplicate extension instances can be verified by
> openssl. I guess openssl is quite gentle when validating these malformed
> certificates.

Well, I don't think its OpenSSL per se in this instance. The
underlying problem is the malleability in the standard. In this case,
its RFC 5280 and:

    "Applications are not required to verify that key identifiers
    match when performing certification path validation." -
    http://tools.ietf.org/html/rfc5280#section-4.2.1.2

In this case, there could be 1, 2, or 10 of them. And its not required
that OpenSSL actually use any of them in path validation.

(Rejecting a valid path due to an incorrect AKI is a different story).


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux