On 17/11/16 13:45, Gervase Markham wrote:
On 17/11/16 12:42, Rob Stradling wrote:
Gerv, why must the EKU extension be critical?

Are you saying that making it critical causes problems?

I was mostly just wearing my "please don't create unnecessary extra work for CAs" hat.

However, let's not forget that it's arguably a violation of RFC5280 to (ab)use the EKU extension in intermediate certs as a constraint mechanism. It's definitely conceivable that there are some modern applications that don't process the EKU extension in intermediate certs, but which do blow up when they encounter a critical extension that they don't process.

I don't remember ever seeing an intermediate cert with a critical EKU
extension.  It would be unfortunate if your "further restrictions" lead
to CAs reissuing their SHA-1 intermediates!

I don't see much risk in a CA reissuing a SHA-1 intermediate /per se/,
because I am assuming that CAs are not trying to engineer collisions.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to