The possibility of same institution having different distinguished names when validating signatures #331
Replies: 1 comment 1 reply
-
Interesting. In "PKIX orthodoxy" this practice is actually explicitly supported through the indirect CRL mechanism (see RFC 5280, search for "indirectCRL" and "cRLIssuer"). Of course using said mechanism requires a number of extensions to be correctly set on both the CRL and the certificate, and I presume that that is not the case here... I know for a fact that Also, is the "binding" between cert issuer and CRL issuer reflected in any trust lists in this case? That could explain how they got away with it until now (the more likely explanation is that nobody bothered to complain, but that's a different issue). I'm not necessarily opposed to adding the aliasing feature you want, but I'd like to make sure that we exhaust all standards-based avenues first and make sure we're not simply covering up for some kind of bug. |
Beta Was this translation helpful? Give feedback.
-
Out in the real world there are cases when some governments have multiple ID document issuing institutions or the same institution having different issuing certificates, however when it comes to CRLs there is usually just one distribution point. And even when there is more than one they all serve the same CRL.
This is the case for Netherlands and Italy in particular. For NL this problem is particularly visible because there are document certificates with a CRL distribution point on them, but the distinguished name of the CRL issuer (from this DP) is not the same as issuer of the document certificate.
Technically:
The difference is just in the extra serialNumber and it is clear that both DNs refer to the same institution, but different certificates. Still there is only one CRL and it is reasonable to assume that it covers both issuing certificates (it is listed as the DP of the subject after all).
Proposal is for the user of the api to configure sets of DNs that are considered aliases in the context of CRL validation. This of course does not strictly confirm to the spec, but given that the whole PKI is a big mess I would argue that allowing more flexibility is a good idea.
I could probably implement this myself, but wanted to discuss first.
Beta Was this translation helpful? Give feedback.
All reactions