-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA with multiple certificates #564
Comments
As per https://tools.ietf.org/html/rfc6489#section-2, there is
where the new CA MUST have a different subject name, so I am struggling with there being multiple CAs with the same DN. I would expect the Or am I missing something here? |
Thanks! That is clear - and strange at the same time :-). I was reading other sources about CA updates last week. About the possibilities of multiple certificates and same DN
The "other source" recommended not to changed the DN of the CA on update. |
Changing a CA’s Subject DN; Part I: Don’t Do That Finally, I found it again. But, as written above, updating the x509 CA may be done different, it's not my fight to do it in that way. |
There is nothing wrong with a CA refreshing a subject entity (i.e. changing the validity dates) certificate and keeping the same DN - this could be for an intermediate CA as well. Having multiple "trusted" CAs with the same DN does worry me - potential for trouble if a bad impersonating CA is inadvertently added to the trusted list. I don't know enough about PKI as to what happens when you simply refresh the CA to update its validity dates, keeping the same DN (and private key). Hence why RFC6489 and associated RFCs came into being I guess. |
AFAIK, only the DN may be "impersonated", if the "true" CA keeps his private key private, everything should be secure. To support multiple certificates with the same DN is mainly to check, which of the certificate of the DN is really used to sign the "next" certificate and is still valid. For Californium I currently adapt this. I still wondering, what the "really recommended" process will be. Finally, it's left to the "system-builder", what they want to do. And my feeling is, it's anyway important for them to test all involved implementations for the possibilities. |
libcoap is very dependent on what the underlying TLS library is doing and what criteria the TLS library uses for deciding whether to send a Certificate Request and how things are handled when a Certificate (or no Certificate) is returned. Likewise the TLS library (client) implementations do not always do the same thing when asked for a Certificate Request (as I discovered when working on #561 ). I agree that if possible, all eventualities need to be covered (providing security is not compromised), but libcoap is restricted by the TLS support capabilities and what the TLS library external APIs are available to control things. |
For OpenSSL
|
version 4.2.1
If the cafile contains multiple certificates for a shared DN (see discussion leshan CA update ), libcoap/openssl seems to chose the last certificate among the certificates with the same DN within that cafile. Is there any option to support CAs with multiple certificates for a CA update according RFC 6489 - Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI)?
The text was updated successfully, but these errors were encountered: