[gnutls-devel] GnuTLS | GnuTLS accepts a critical Authority Information Access (#1168)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Wed Jan 27 09:25:41 CET 2021

GOODPWDCETCSZ created an issue: https://gitlab.com/gnutls/gnutls/-/issues/1168

## Description of problem:
GnuTLS accepts a critical Authority Information Access. OpenSSL and mbedTLS reject it. RFC 5280 requires the ext AIA must be marked as non-critical.

## Version of gnutls used:

3.5.5, 3.6.13

## Distributor of gnutls (e.g., Ubuntu, Fedora, RHEL)

Ubuntu x64

## How reproducible:

Steps to Reproduce:

 * `certtool --verify --load-ca-certificate ca.pem --infile seed-7s35-59s37-384s28-468s36.pem.pem`

## Actual results:
certtool --verify --load-ca-certificate ./certs_related/ca.pem --infile ./certs/seed-7s35-59s37-384s28-468s36.pem
Note that no verification profile was selected. In the future the medium profile will be enabled by default.
Use --verify-profile low to apply the default verification of NORMAL priority string.
Loaded CAs (1 available)
	Subject: CN=DT-peace,OU=UNSC-peace,O=UNGA,ST=NYS,C=UN
	Checked against: CN=DT,OU=UNSC,O=UNGA,ST=NYS,C=UN
	Signature algorithm: RSA-SHA256
	Output: Verified. The certificate is trusted. 

Chain verification output: Verified. The certificate is trusted.

## Expected results:

Consistent verification results among GnuTLS and other TLS implementations.

## Attachments:



Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1168
You're receiving this email because of your account on gitlab.com.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210127/c3604513/attachment.html>

More information about the Gnutls-devel mailing list