Skip to content

Expose all x509 verification policy options #14765

@ralphje

Description

@ralphje

Although the library does a pretty good job of validating X.509 certificates following the WebPKI spec, it currently does not expose everything to allow implementing policies from other specifications or implementations.

In my case, I try to verify (legacy) code signing certificates with low RSA moduli, but minimum_rsa_modulus is not exposed to the PolicyBuilder API.

It could make sense to wrap this in some sort of algorithm policy, but perhaps that is making it more complicated than really needed. It should at least be possible to disable this check, or specify a different minimum modulus.

Additionally, it appears not possible to modify the extended_key_usage it checks for in EE certificates. Perhaps this could be worked around by defining an ExtensionPolicy, but that will require some additional (duplicate) code.

There may be more policy related settings that are unmodifiably defaulted to WebPKI standards. I believe all of these should be modifiable (or entirely disableable) by a custom policy.

permitted_public_key_algorithms and permitted_signature_algorithms were already identified and tracked in #13391

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions