Implement certUsageIPSec as defined in RFC 4945
Categories
(NSS :: Libraries, defect, P2)
Tracking
(Not tracked)
People
(Reporter: KaiE, Assigned: KaiE)
Details
Attachments
(1 file, 7 obsolete files)
33.66 KB,
patch
|
rrelyea
:
review+
|
Details | Diff | Splinter Review |
Comment 1•9 years ago
|
||
Comment 2•9 years ago
|
||
Comment 3•9 years ago
|
||
Comment 4•9 years ago
|
||
Comment 5•9 years ago
|
||
Comment 6•9 years ago
|
||
Comment 7•8 years ago
|
||
Comment 8•8 years ago
|
||
Assignee | ||
Comment 9•8 years ago
|
||
Assignee | ||
Comment 10•8 years ago
|
||
Assignee | ||
Comment 11•8 years ago
|
||
Assignee | ||
Comment 12•8 years ago
|
||
Assignee | ||
Comment 13•8 years ago
|
||
Assignee | ||
Comment 14•8 years ago
|
||
Updated•7 years ago
|
Comment 15•6 years ago
|
||
Comment 16•6 years ago
|
||
Assignee | ||
Comment 17•6 years ago
|
||
Assignee | ||
Comment 18•6 years ago
|
||
Assignee | ||
Comment 19•6 years ago
|
||
Assignee | ||
Comment 20•6 years ago
|
||
Assignee | ||
Comment 21•6 years ago
|
||
Comment 22•6 years ago
|
||
Comment 23•6 years ago
|
||
Assignee | ||
Comment 24•6 years ago
|
||
Assignee | ||
Comment 25•6 years ago
|
||
Comment 26•6 years ago
|
||
Comment 27•6 years ago
|
||
Comment 28•6 years ago
|
||
Comment 29•6 years ago
|
||
Comment 30•6 years ago
|
||
Updated•6 years ago
|
Comment 31•6 years ago
|
||
It looks like this patch is not ignoring EKU's when they are marked critical. This is causing problems already :/
The RFC test is not clear to me:
https://tools.ietf.org/html/rfc4945#section-5.1.3.12
Conforming IKE implementations are not required to support EKU. If a
critical EKU extension appears in a certificate and EKU is not
supported by the implementation, then RFC 3280 requires that the
certificate be rejected. Implementations that do support EKU MUST
support the following logic for certificate validation:
o If no EKU extension, continue.
o If EKU present AND contains either id-kp-ipsecIKE or
anyExtendedKeyUsage, continue.
o Otherwise, reject cert.
It seems the bullet list kinda conflicts the paragraph above it
So now if a certificate has serverAuth (for compatibility before NSS/others supported the IPsec profile, and they happen to have made that EKU critical, then NSS rejects the cert.
libreswan with older NSS would attempt to validate as server, and on failure validate as client, as one of these would pass. libreswan with the newer NSS with ipsec profiles now rejects these.
I suggest that NSS for IPsec profiles does not reject critical EKU's
Comment 32•6 years ago
|
||
note also that a lot of VPN serves offer TLS and IKE/IPsec, re-using the same certificate. So that is another reason why authServer might appear.
Assignee | ||
Comment 33•6 years ago
|
||
Paul, file a new bug for the new issue, and mark it as dependent on this bug. New issues should be discussed in new bugs.
Assignee | ||
Comment 34•6 years ago
|
||
I forgot to say "please"
Comment 35•6 years ago
|
||
I will, just talking to Hubert Kario to ensure we fully understand the issue before I file the report.
Comment 36•6 years ago
|
||
I've openned bug 1537927
Updated•4 years ago
|
Description
•