Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EKU Consitency #10

Open
kenji-lightship opened this issue May 17, 2024 · 1 comment
Open

EKU Consitency #10

kenji-lightship opened this issue May 17, 2024 · 1 comment

Comments

@kenji-lightship
Copy link

kenji-lightship commented May 17, 2024

Depending on the SFR and App notes are inconsistent regarding whether EKUs are required, recommended, or only required in some cases.
SSH
There is not an appropriate EKU for SSH.
IKE
While the id-kp-ipsecIKE, RFC 4945 says, "Conforming IKE implementations are not required to support EKU" and "that EKU extensions in certificates meant for use in IKE are NOT RECOMMENDED."

Generall/Broad EKU mentions

  • FDP_CER_EXT.1.1/OLTleaf Application Note says, "the extendedKeyUsage extension is claimed in FDP_CER_EXT.1.2 to distinguish which functions are supported by the certificate." "is claimed" makes this sound like it is mandatory.
  • FDP_CER_EXT.1.2/OLTleaf Application Note says, "It is recommended that the extendedKeyUsage is claimed..."
  • FIA_X509_EXT.1.2 Application Note says, "The extendedKeyUsage is expected for many functions. It is claimed if required by the supported functions"
  • FIA_X509_EXT.1.5 Application Note says, "The ST author claims all explicit EKU values for applications (Code integrity, OCSP, TLS, DTLS, SMIME), claimed in FIA_X509_EXT.2.1. It is preferred, but not required that each application using certificates indicated in FIA_X509_EXT.2.1 is associated with an EKU." SSH and IPsec are both options in FIA_X509_EXT.2.1.

Proposed Resolution
Update FDP_CER_EXT.1.1/OLTleaf so it provides nuance about when the EKU is required.
Clarify which explicit EKU values for applications must be claimed (this applies to "EKU values for applications" and "recommended"). It appears this should not reference FIA_X509_EXT.2.1. In addition to Code integrity, OCSP, TLS, DTLS, and SMIME; id-kp-cmpRA and id-kp-cmcRA also appear to be required in some cases.

@jfisherbah
Copy link
Contributor

  • FDP_CER_EXT.1.1/OLTleaf app note updated to make it clear that this only applies when multiple functions require explicit EKU values, not that each function necessarily requires an EKU value
  • FDP_CER_EXT.1.2/OLTleaf app note updated same as above
  • FIA_X509_EXT.1.2 no change - this is still an accurate statement
  • FIA_X509_EXT.1.5 no change

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants