-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x509 cert string type mangling breaks chains #40
Comments
joyent-automation
pushed a commit
that referenced
this issue
Dec 8, 2017
Reviewed by: Cody Peter Mello <[email protected]> Approved by: Cody Peter Mello <[email protected]>
is this change gonna be merged? |
Yeah, this will be released as part of 1.13.2 today. |
This was referenced Oct 10, 2018
This was referenced Apr 12, 2019
This was referenced May 31, 2019
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
According to the X509 RFC, cert chain validators are free to assume that if a DN attribute's string types differ, they are not a valid match. Currently, the x509 generation code in
identity.js
always generatesPrintableString
attribute values where the characters in the string can be contained in the ASCII set. This unfortunately means that if we, say, read in a certificate that hasUTF8String
attributes in its subject DN and copy that into a new certificate's issuer DN, some implementations (notablylibnss
) will not consider the resulting certificate's issuer DN and the other cert's subject DN to be a match, and will not follow the signing chain.The text was updated successfully, but these errors were encountered: