File tree Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Expand file tree Collapse file tree 1 file changed +19
-0
lines changed Original file line number Diff line number Diff line change @@ -144,3 +144,22 @@ Policy](https://github.com/hacl-star/hacl-star/blob/main/SECURITY.md).)
144144
145145The Everest variant is only used when ` MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED `
146146configuration option is defined. This option is off by default.
147+
148+ #### Formatting of X.509 certificates and certificate signing requests
149+
150+ When parsing X.509 certificates and certificate signing requests (CSRs),
151+ Mbed TLS does not check that they are strictly compliant with X.509 and other
152+ relevant standards. In the case of signed certificates, the signing party is
153+ assumed to have performed this validation (and the certificate is trusted to
154+ be correctly formatted as long as the signature is correct).
155+ Similarly, CSRs are implicitly trusted by Mbed TLS to be standards-compliant.
156+
157+ ** Warning!** Mbed TLS must not be used to sign untrusted CSRs unless extra
158+ validation is performed separately to ensure that they are compliant to the
159+ relevant specifications. This makes Mbed TLS on its own unsuitable for use in
160+ a Certificate Authority (CA).
161+
162+ However, Mbed TLS aims to protect against memory corruption and other
163+ undefined behavior when parsing certificates and CSRs. If a CSR or signed
164+ certificate causes undefined behavior when it is parsed by Mbed TLS, that
165+ is considered a security vulnerability.
You can’t perform that action at this time.
0 commit comments