Subject Key Identifier hash method

David von Oheimb it at von-Oheimb.de
Thu Jun 8 05:53:10 UTC 2023


On Wed, 2023-06-07 at 10:46 -0400, Robert Moskowitz wrote:
> thanks all.  It is as I thought.  You have to pretty much know what
> the 
> CA did.  You can guess, but go read the CP!

I doubt that you'll find such inessential info on SKIDs in a CP.
As Tomas wrote, it's just any identifier for the public key that is
unique per CA.
Since RFC 5280 suggests using the SHA1 hash value of the key and this is
a reasonably
unique and convenient way to achieve that, this is what most
implementations do.
There is no need to use anything more involved such as any of the SHA-2
algos.

 David

> 
> On 6/7/23 10:37, Corey Bonnell wrote:
> > The hash method isn't explicitly encoded in the certificate, but it
> > can be
> > derived if you have the SubjectPublicKey(Info). If you have the
> > public key,
> > then you can calculate the IDs using the various methods and seeing
> > which one
> > matches the ID encoded in the certificate. The first method defined
> > in RFC
> > 5280, section
> > https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2
> > (SHA-1 of the subjectPublicKey field (not the SPKI as a whole)) is
> > by far the
> > most common method. The two methods in RFC 5280 require only the
> > subjectPublicKey, whereas some of the methods defined in RFC 7093
> > use the
> > SubjectPublicKeyInfo as a whole.
> > 
> > Thanks,
> > Corey
> > 
> > -----Original Message-----
> > From: openssl-users <openssl-users-bounces at openssl.org> On Behalf Of
> > Robert
> > Moskowitz
> > Sent: Wednesday, June 7, 2023 8:57 AM
> > To: openssl-users at openssl.org
> > Subject: Subject Key Identifier hash method
> > 
> > I am trying to figure out if the Subject Key Identifier hash method
> > is carried
> > in the certificate.  An asn1dump of a "regular" cert shows:
> > 
> >     276:d=4  hl=2 l=  29 cons:     SEQUENCE
> >     278:d=5  hl=2 l=   3 prim:      OBJECT            :X509v3
> > Subject Key
> > Identifier
> >     283:d=5  hl=2 l=  22 prim:      OCTET STRING      [HEX
> > DUMP]:04144F0C1A75F4AF13DC67EC18465C020FC22A82616B
> >     307:d=4  hl=2 l=  31 cons:     SEQUENCE
> >     309:d=5  hl=2 l=   3 prim:      OBJECT            :X509v3
> > Authority Key
> > Identifier
> >     314:d=5  hl=2 l=  24 prim:      OCTET STRING      [HEX
> > DUMP]:30168014A8885F91878E4ED6AA2056C535E2212413F96BA2
> > 
> > 
> > I cannot easily see if the hashing method is contained here.  I am
> > assuming it
> > is a sha2 hash of the EdDSA public keys, but how do I tell?
> > 
> > Of course I am asking as I want to use the rfc9374 DETs here.
> > 
> > thanks
> > 
> 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20230608/7dc235dd/attachment.htm>


More information about the openssl-users mailing list