You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
RFC 5280 (Section 4.1) says that certificate fields are to be encoded with DER when calculating X.509 signatures.
The Section 11.6 of X.690 standard says that a set-of component must be ordered in lexicographical order when the encoding is DER.
The distinguished names of certificates generated by Vault do not obey this rule,
and it causes certificate validation failure when the validator correctly distinguishes between BER (which is unordered) and DER (this is uncommon, but I know that validation fails with at least BouncyCastle).
To Reproduce
Run these commands on a fresh Vault instance:
Observe the subject output: /C=US/ST=California/L=San Francisco/O=Hashicorp/OU=long test/OU=test/CN=example.com
Expected behavior
The correct output should be: /C=US/ST=California/L=San Francisco/O=Hashicorp/OU=test/OU=long test/CN=example.com
There are two OUs, and shorter values come before longer values in DER ordering.
Environment:
Vault Server Version (retrieve with vault status): v1.4.3
Vault CLI Version (retrieve with vault version): v1.4.3
Server Operating System/Architecture: Linux
Vault server configuration file(s):
None, but I started Vault with these commands:
Additional context
This is a bug in golang encoding/asn1 and it has already been fixed upstream in Go 1.15 with golang/go#38228.
I have submitted this issue for tracking purposes.
The text was updated successfully, but these errors were encountered:
Uh oh!
There was an error while loading. Please reload this page.
Describe the bug
RFC 5280 (Section 4.1) says that certificate fields are to be encoded with DER when calculating X.509 signatures.
The Section 11.6 of X.690 standard says that a set-of component must be ordered in lexicographical order when the encoding is DER.
The distinguished names of certificates generated by Vault do not obey this rule,
and it causes certificate validation failure when the validator correctly distinguishes between BER (which is unordered) and DER (this is uncommon, but I know that validation fails with at least BouncyCastle).
To Reproduce
Run these commands on a fresh Vault instance:
Observe the subject output:
/C=US/ST=California/L=San Francisco/O=Hashicorp/OU=long test/OU=test/CN=example.com
Expected behavior
The correct output should be:
/C=US/ST=California/L=San Francisco/O=Hashicorp/OU=test/OU=long test/CN=example.com
There are two OUs, and shorter values come before longer values in DER ordering.
Environment:
vault status
): v1.4.3vault version
): v1.4.3Vault server configuration file(s):
None, but I started Vault with these commands:
Additional context
This is a bug in golang
encoding/asn1
and it has already been fixed upstream in Go 1.15 with golang/go#38228.I have submitted this issue for tracking purposes.
The text was updated successfully, but these errors were encountered: