New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 851675 link

Starred by 2 users

Issue metadata

Status: WontFix
Owner:
Closed: Jun 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Feature



Sign in to add a comment

RSA server certificate with Key Usage of just "digitalSignature" is rejected by NSS

Project Member Reported by marchuk@chromium.org, Jun 11 2018

Issue description

Summary: Customers have many use cases, where they need to use certificates with URI:ldap CA Issuers, e.g. 

            Authority Information Access:
                CA Issuers - URI:ldap:///CN=servername,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=us,DC=corp?cACertificate?base?objectClass=certificationAuthority


Example (RVG only) 
https://drive.google.com/open?id=1RnbG5POX57evOlUBo3ihhLXyWgD84RMy

Currently users are receiveing NET::ERR_CERT_INVALID errors when they are trying to use this kind of certificates on Chrome OS devices.

Use case / Motivation:
Use more Chromebooks in existing infrastructure.

Existing workarounds:
None

Case#: 15749240
 

Comment 1 by jayhlee@google.com, Jun 11 2018

Cc: rsleevi@chromium.org
+ rsleevi: can you comment if this is feasible?

Comment 2 by jayhlee@google.com, Jun 11 2018

Components: Internals>Network>Certificate
Status: WontFix (was: Untriaged)
I can confidently say this is a very intentional WontFix, on security and standards grounds. This can be effectively mitigated a number of ways - including simply configuring the server to serve the correct AIA. This has zero usage on the Public Web, but would have significant security risk (LDAP as a protocol is a bit of a tire fire, especially with its use of BER), and because it would work before a verified chain is obtained, would end up being exposed to the Public Web - we could not segment it out for Enterprise.

1) Serve the correct chain on the server
2) Configure HTTP AIA endpoints (the most common case of such LDAP URIs is Active Directory, which ADCS will also configure IIS with an HTTP AIA by default)

We're not going to ship or write an LDAP library to run and be exposed to the Web at large, that'd be... a road to sadness :)

(They'd also be getting these errors on Android, iOS, and macOS, so...)
Status: Untriaged (was: WontFix)
davidben pointed out that I misread - ERR_CERT_INVALID != ERR_CERT_AUTHORITY_INVALID

Can you confirm (with netlog) the error being returned?
Labels: Needs-Feedback
Cc: marcore@chromium.org

Comment 7 by jayhlee@google.com, Jun 12 2018

Owner: marchuk@chromium.org
marchuk: please provide an answer to Ryan's question above
Thank you for opening this bug on behalf of the case that I opened with Google for Work Support under case 15749240.

Rsleevi: You mentioned that we would be getting these errors on Android, iOS, and macOS which is incorrect. This site is accessed internally by about 4500 employees and over around half of them are currently running macOS without any certificate issue being raised by the Chrome Browser.

I am not a member of our internal PKI group, I am just an earlier tester of the Chromebook in our environment. That being said, would it be possible to join a brief conference call sometime next week to discuss this with a member of our PKI team? 

We are committed to adopting Google's ecosystem into our enterprise (G-Suite, GCP, Chrome/Pixelbooks, etc...) but need to see if this can be ironed out in any other way outside of potentially impacting all the other internally issued certificates within our domain.

If anyone needs additional information from me, please don't hesitate to reach out.

Comment 9 by eroman@chromium.org, Jun 12 2018

Thanks for the report.

The issue is with the leaf certificate's Key Usage
(Not the presence of an ldap:// AIA URL, which FWIW is quite common)

NSS (crypto library being used for cert verification on ChromeOS) requires that the leaf certificate (TLS Server Auth) contains either keyEncipherment or keyAgreement.

However in this case it contains only digitalSignature.

My suggestion is to add keyEncipherment when generating the certificate, as is typically done.
Status: WontFix (was: Untriaged)
Summary: RSA server certificate with Key Usage of just "digitalSignature" is rejected by NSS (was: CrOS FR: Add support of certificate with URI:ldap CA Issuers in Chrome OS)

Sign in to add a comment