Hi all,

In my opinion, CSRs should really be limited to conveying the public key and a 
proof of possession of the private key; the fields included therein may act as 
confirmatory signals for a CA, but shouldn’t be directly relied upon e.g. to 
generate a tbsCertificate. Rather, the values placed in fields of a 
tbsCertificate should originate from the CA’s validated data store to ensure 
that the only paths for data to become part of a signed certificate are through 
static configurations (e.g. signatureAlgorithm) or known-validated data.

There’s plenty of nuance we can discuss as well, but generally speaking I 
believe it’s bad practice to rely on fields in the CSR.

Cheers,
-Clint

> On Sep 29, 2023, at 8:27 AM, Ben Wilson via Smcwg-public 
> <smcwg-public@cabforum.org> wrote:
> 
> All,
> I'm interested in gathering information from Certificate Issuers about the 
> kind of information that they would like to collect/extract from the CSRs 
> they receive from S/MIME certificate applicants. This information could be 
> used to refine a system to generate CSRs that result in certificates 
> compliant with the various profiles defined in the S/MIME BRs. Alternatively, 
> what is the minimum amount of information that CAs might expect to obtain 
> from CSRs? In other words, which fields should a CSR generator integrated 
> with a Certificate Consumer's software support?
> Thanks,
> Ben
> _______________________________________________
> Smcwg-public mailing list
> Smcwg-public@cabforum.org
> https://lists.cabforum.org/mailman/listinfo/smcwg-public

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Smcwg-public mailing list
Smcwg-public@cabforum.org
https://lists.cabforum.org/mailman/listinfo/smcwg-public

Reply via email to