HOME

TheInfoList



OR:

The certification path validation algorithm is the
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algorithms are used as specificat ...
which verifies that a given certificate path is valid under a given
public key infrastructure A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilit ...
(PKI). A path starts with the Subject certificate and proceeds through a number of intermediate certificates up to a trusted
root certificate In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed (and it is possible for a certificate to have multiple trust paths, say if ...
, typically issued by a trusted
certificate authority In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This ...
(CA). Path validation is necessary for a
relying party A relying party (RP) is a computer term used to refer to a server providing access to a secure software application. Claims-based applications, where a claim is a statement an entity makes about itself in order to establish access, are also called ...
to make an informed trust decision when presented with any certificate that is not already explicitly trusted. For example, in a hierarchical PKI, a certificate chain starting with a web server certificate might lead to a small CA, then to an intermediate CA, then to a large CA whose
trust anchor In cryptographic systems with hierarchical structure, a trust anchor is an authoritative entity for which trust is assumed and not derived. In the X.509 architecture, a root certificate would be the trust anchor from which the whole chain of trust ...
is present in the relying party's web browser. In a bridged PKI, a certificate chain starting with a user at Company A might lead to Company A's CA certificate, then to a bridge CA, then to company B's CA certificate, then to company B's trust anchor, which a relying party at company B could trust. defines a standardized path validation algorithm for
X.509 In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secu ...
certificates, given a certificate path. (Path discovery, the actual construction of a path, is not covered.) The algorithm takes the following inputs: * The certificate path to be evaluated; * The current date/time; * The list of
certificate policy A certificate policy (CP) is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter. When in use with X.509 certificates ...
object identifiers (OIDs) acceptable to the relying party (or any); * The trust anchor of the certificate path; and * Indicators whether policy mapping is allowed and how/when/whether the "any" policy
OID Oid or OID may refer to: * ''Oid'', a 2005 album by Space Manoeuvres * Object identifier, an object used in computing to name an object * Oracle Internet Directory, a directory service produced by Oracle Corporation * OpenID, a shared identity se ...
is to be tolerated. In the standardized algorithm, the following steps are performed for each certificate in the path, starting from the trust anchor. If any check fails on any certificate, the algorithm terminates and path validation fails. (This is an explanatory summary of the scope of the algorithm, not a rigorous reproduction of the detailed steps.) * The public key algorithm and parameters are checked; * The current date/time is checked against the validity period of the certificate; * The revocation status is checked, whether by CRL,
OCSP The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is described in RFC 6960 and is on the Internet standards track. It was created as an alternative t ...
, or some other mechanism, to ensure the certificate is not revoked; * The issuer name is checked to ensure that it equals the subject name of the previous certificate in the path; * Name constraints are checked, to make sure the subject name is within the permitted subtrees list of all previous CA certificates and not within the excluded subtrees list of any previous CA certificate; * The asserted
certificate policy A certificate policy (CP) is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter. When in use with X.509 certificates ...
OIDs ''Oids'' is a multidirectional shooter developed and self-published by FTL Games in 1987. The game was originally released on the Atari ST, followed by a B&W version for the classic 68k Macintosh in 1990. The Atari ST version, written by Dan Hewi ...
are checked against the permissible OIDs as of the previous certificate, including any policy mapping equivalencies asserted by the previous certificate; * Policy constraints and basic constraints are checked, to ensure that any explicit policy requirements are not violated and that the certificate is a CA certificate, respectively. This step is crucial in preventing some
man in the middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
s;
Moxie Marlinspike Moxie Marlinspike is an American entrepreneur, cryptographer, and computer security researcher. Marlinspike is the creator of Signal, co-founder of the Signal Technology Foundation, and served as the first CEO of Signal Messenger LLC. He is als ...

New Tricks For Defeating SSL In Practice
Black Hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and white ...
DC Briefings 2009 conference.
* The path length is checked to ensure that it does not exceed any maximum path length asserted in this or a previous certificate; * The key usage extension is checked to ensure that is allowed to sign certificates; and * Any other critical extensions are recognized and processed. If this procedure reaches the last certificate in the chain, with no name constraint or policy violations or any other error condition, then the certificate path validation algorithm terminates successfully.


External links

{{reflist


See also

*
Delegated Path Discovery Delegated Path Discovery (DPD) is a method for querying a trusted server for information about a public key certificate. DPD allows clients to obtain collated certificate information from a trusted DPD server. This information may then be used ...
*
Delegated Path Validation Delegated Path Validation (DPV) is a method for offloading to a trusted server the work involved in validating a public key certificate. Combining certificate information supplied by the DPV client with certificate path and revocation status info ...
Cryptographic protocols