On 18/11/2016 5:34 μμ, Rob Stradling via Public wrote:
On 18/11/16 15:26, Gervase Markham wrote:
On 18/11/16 15:04, Rob Stradling wrote:
crt.sh currently has 302 CA certificates that contain the
id-kp-clientAuth EKU OID

I think you mean id-kp-emailProtection here, from your figures...

Yeah, I did.  Sorry about that.

and that are trusted by Microsoft and/or> Mozilla and/or Apple.

Here's a summary of the EKU OIDs contained in those 302 intermediate certs:

 count |    x509_extkeyusages     |            purpose
-------+--------------------------+--------------------------------
   302 | 1.3.6.1.5.5.7.3.4        | id-kp-emailProtection
   284 | 1.3.6.1.5.5.7.3.2        | id-kp-clientAuth
   104 | 1.3.6.1.5.5.7.3.1        | id-kp-serverAuth

People make certs usable for both serverAuth and email/clientAuth? :-|

Sadly.  Do you want any more details?

    60 | 1.3.6.1.5.5.7.3.9        | id-kp-OCSPSigning

Wait, what?

Depressing, isn't it.


Others have already replied so I will not state what's already been said. It may be strange to see an end-entity certificate with both these EKUs (serverAuth and emailProtection). However, the BRs allow it (Section 7.1.2.3 "Either the value id‐kp‐serverAuth [RFC5280] or id‐kp‐clientAuth [RFC5280] or both values MUST be present. id‐kp‐emailProtection [RFC5280] MAY be present. Other values SHOULD NOT be present. ").


Dimitris.
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to