[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] Enforce EKU requirements for client tokens during PKINIT



On Mar 17, 2008, at 4:31 PM, Henry B. Hotz wrote:

> I'm probably mixing different levels of selection in my thinking.  I  
> do not know if there will be more than one cert on the card that we  
> might have to worry about.  There isn't on the prototype I have and  
> I hope that will be the same for the real cards.  IIUC your  
> selection expression is to choose which cert is to be used.

DoD CACs and Federal PIVs have at least two certs (and probably three  
in many PIV PKIs) that meet the minimal PKINIT criteria (i.e.,  
digitialSignature--PIV auth cert and the email signing cert, possibly  
a non-email identity cert).

While in CACs and PIVs hold only one *set* of certs all from the same  
PKI and only one cert will assert any PKINIT EKUs (whether MS or  
IETF), the capability for an expressive filtering language would be  
useful for someone working with a multi-organization card with more  
than one credential set loaded.

It's a good idea, even if I won't use it.  :)

-- Tim

smime.p7s