RFR: 8277246: No need to check about KeyUsage when validating a TSA certificate [v2]
Michael StJohns
mstjohns at comcast.net
Tue Nov 16 23:43:31 UTC 2021
On 11/16/2021 6:37 PM, Weijun Wang wrote:
> On Tue, 16 Nov 2021 21:00:12 GMT, Weijun Wang <weijun at openjdk.org> wrote:
>
>>> There is no need to check for the KeyUsage extension when validating a TSA certificate.
>>>
>>> A test is modified where a TSA cert has a KeyUsage but without the DigitalSignature bit.
>> Weijun Wang has updated the pull request incrementally with one additional commit since the last revision:
>>
>> clarify RFC requirement
> I did see an issuer of TSA certs whose own certificate has EKU with id-kp-timeStamping and KU with both DigitialSignature and keyCertsign. This cert should be rejected if it signed a timestamp response.
>
> -------------
>
> PR: https://git.openjdk.java.net/jdk/pull/6416
Not quite. The rule is that if there's both an ExtendedKeyUsage and
KeyUsage extensions, for any given OID in the EKU there has to be at
least one bit in the KeyUsage extenstion that's compatible - there may
be more than one. If there's an EKU, and no KeyUsage, then only the EKU
needs to have an OID for the key usage purpose - in this case signing a
timestamp.
The cert you cite would be valid for timestamping.
Mike
More information about the security-dev
mailing list