[Openswan Users] X.509 key usage
Jacco de Leeuw
jacco2 at dds.nl
Mon Jul 19 17:09:51 CEST 2004
Andreas Steffen wrote:
> 4.1.3.13. ExtendedKeyUsage
>
> No ExtendedKeyUsage usages are defined specifically for IPsec, so if
> this extension is present and marked critical, use of this
> certificate for IPsec MUST be treated as an error unless the
> extension contains the anyExtendedKeyUsage keyPurposeID, which
> asserts that the certificate can be used for any purpose.
> Implementations MAY ignore this extension if it is marked non-
> critical. Implementations MUST NOT generate this extension in
> certificates which are being used for IPsec.
The L2TP/IPsec client included with Windows 2000/XP uses ExtendedKeyUsage
for distinguishing between certificates issued to client and servers,
respectively. The "Client Authentication" EKU has a value of 1.3.6.1.5.5.7.3.2
for instance. If a client certificate does not contain this EKU, an attacker
could use this client certificate to pose as a 'server' to other clients.
> Gregor, in your opinion, what would be the gain in terms of
> increased security by heeding the keyUsage flags? Which would be the
> most important checks you'd like to see implemented in *swan?
Perhaps certificates presented in L2TP/IPsec connections could be checked
for the "Client Authentication" EKU, but it's probably not that important.
If ever a stolen server certificate is presented as a client certificate
you have bigger problems :-)
Jacco
--
Jacco de Leeuw mailto:jacco2 at dds.nl
Zaandam, The Netherlands http://www.jacco2.dds.nl
More information about the Users
mailing list