Skip to content

Commit 7950e9f

Browse files
Add X.509 formatting validation to SECURITY.md
Clarify that strict formatting of X.509 certificates is not checked by Mbed TLS and that it therefore should not be used to construct a CA. Signed-off-by: David Horstmann <[email protected]>
1 parent a7f52de commit 7950e9f

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

SECURITY.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,3 +144,17 @@ Policy](https://github.com/hacl-star/hacl-star/blob/main/SECURITY.md).)
144144

145145
The Everest variant is only used when `MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED`
146146
configuration option is defined. This option is off by default.
147+
148+
#### Formatting of X.509 certificates and certificate signing requests
149+
150+
When parsing X.509 certificates and certificate signing requests (CSRs),
151+
Mbed TLS does not check that they are strictly compliant with X.509 and other
152+
relevant standards. In the case of signed certificates, the signing party is
153+
assumed to have performed this validation (and the certificate is trusted to
154+
be correctly formatted as long as the signature is correct).
155+
Similarly, CSRs are implicitly trusted by Mbed TLS to be standards-compliant.
156+
157+
**Warning!** Mbed TLS must not be used to sign untrusted CSRs unless extra
158+
validation is performed separately to ensure that they are compliant to the
159+
relevant specifications. This makes Mbed TLS on its own unsuitable use in a
160+
Certificate Authority (CA).

0 commit comments

Comments
 (0)