Replies: 4 comments 3 replies
-
DigiCert seems to be testing this extension here. Unfortunately, I don't think their PQC toolkit is freely available. |
Beta Was this translation helpful? Give feedback.
-
The simple answer to this question is "No". The more complete answer: Those are the "Isara Catalyst" composite certificates: Originally patent-protected and hence not implemented in open source code then. By now Isara seems to have released their legal grip on this approach (otherwise wouldn't have been accepted at ITU, maybe), but I personally wasn't interested in wading into this legal morass which is why we didn't look into this deeper. Technically, I also think this is rather a question to the OpenSSL upstream code base: Either how to facilitate use of these extensions from within a provider OR how to use the encoding logic of a provider when adding extensions to a certificate by way of standard OpenSSL APIs. Lastly, have you looked this this alternative for composite certificates? This seems to be implementable in a provider (statement by Entrust -- who also indicated interest to contribute this to the open source community). |
Beta Was this translation helpful? Give feedback.
-
By the way, I found this email in the IETF mail list:
|
Beta Was this translation helpful? Give feedback.
-
Just in case someone else arrives at this discussion at some point later. I wrote an email to the IETF lamps mail list that you can read here: https://mailarchive.ietf.org/arch/msg/spasm/ZDrD6KA1IxDM2CRCruljIn_woQs/ And I got two interesting answers. From DigiCert, Tim Hollebeek mentioned that while trying to implement this they found some downsides. So probably it's not worthy trying to implement this. And from Entrust, John Gray pointed out a draft about "Chameleon Certificates", which (at least from reading the introduction) seems to focus on the transition to problem and backwards compatibility. |
Beta Was this translation helpful? Give feedback.
-
Hi,
In this IETF draft, later standardized by ITU-T (section 7.2.2 of their X.509 (10/2019) document), it is mentioned how to use
subjectAltPublicKeyInfo
,altSignatureAlgorithm
andaltSignatureValue
to include two algorithms in a single certificate.The idea is not to increase security but to facilitate a PQC migration since the extension is marked as non-critical. Clients that can validate PQC signatures would do that, clients that do not support PQC algs (or legacy systems that are not even aware of this extension) would fallback to the classical signature.
Any idea if it is possible to test this using the OQS provider for OpenSSL 3 or the OpenSSL 1.1 fork? If it is currently not possible, someone familiar with X.509 extensions can point me in the right direction to implement this?
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions