Nelson Bolyard a écrit :
> Every root CA has EKU info associated with it, limiting the applications
> for that CA.

 From their document :
"We will attach EKU metadata to the certificate as metadata in the 
Windows certificate store so you do not need to regenerate your root 
certificate with the EKU extension."

This is a good thing they also do it that way, because the mechanism of 
setting some EKU values on a CA certificate that are intended to serve 
as a constraint limiting the allowed EKU on the End Entity certificates 
under it is *not* PKIX/X.509 compliant. An EKU applies to *the* cert 
that contains it, and the meaning of setting a SSL client/SSL server EKU 
to a CA cert is unclear, at best (under a strict, to the letter reading, 
it should make that cert unusable).

Whereas RFC3280 also says that it's OK when needed to use application 
specific data to further constrain path validation.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to