[gnutls-devel] GnuTLS | GnuTLS accepts a non-CA cert with a critical ext nameConstraints (#1171)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Wed Jan 27 10:01:39 CET 2021

GOODPWDCETCSZ created an issue: https://gitlab.com/gnutls/gnutls/-/issues/1171

## Description of problem:

GnuTLS accepts a non-CA cert with a critical ext nameConstraints. mbedTLS and wolfSSL reject it.

## Version of gnutls used:

3.5.5, 3.6.13

## Distributor of gnutls (e.g., Ubuntu, Fedora, RHEL)

Ubuntu x64

## How reproducible:

Steps to Reproduce:

 * `certtool --verify --load-ca-certificate ca.pem --infile seed-5s26-174s36-353s31.pem`

## Actual results:
certtool --verify --load-ca-certificate ./certs_related/ca.pem --infile ./certs/seed-5s26-174s36-353s31.pem
Note that no verification profile was selected. In the future the medium profile will be enabled by default.
Use --verify-profile low to apply the default verification of NORMAL priority string.
Loaded CAs (1 available)
	Subject: CN=DT-peace,OU=UNSC-peace,O=UNGA,ST=NYS,C=UN
	Checked against: CN=DT,OU=UNSC,O=UNGA,ST=NYS,C=UN
	Signature algorithm: RSA-SHA256
	Output: Verified. The certificate is trusted. 

Chain verification output: Verified. The certificate is trusted.

## Expected results:

Consistent verification results among GnuTLS and other TLS implementations.

## Attachments:



Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1171
You're receiving this email because of your account on gitlab.com.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210127/cded20e5/attachment.html>

More information about the Gnutls-devel mailing list