Scenario 5.1: Chain Building

Category: Validation & Trust
Complexity: * (Medium)
Prerequisites: Certificates, Trust Store
Estimated Time: 10-15 minutes </WRAP> —- ===== Description ===== This scenario describes building a certificate chain (Chain Building) from an end-entity certificate to the trust anchor. Chain building is the first step in certificate validation. Process: - End-entity certificate → Find issuer - Issuer → Find its issuer - Repeat until trust anchor is reached —- ===== Workflow ===== <mermaid> flowchart BT EE[End-Entity Certificate] –> INT[Intermediate CA] INT –> ROOT[Root CA] ROOT –> TRUST{In Trust Store?} TRUST –>|Yes| OK[Chain complete] TRUST –>|No| FAIL[Chain incomplete] style OK fill:#e8f5e9 style FAIL fill:#ffebee </mermaid> —- ===== Code Example (C#) ===== <code csharp> using WvdS.Security.Cryptography.X509Certificates.Extensions.PQ; using System.Security.Cryptography.X509Certificates; using var ctx = PqCryptoContext.Initialize(); Load certificate to validate var serverCert = ctx.LoadCertificate(„server.crt.pem“); Configure trust store using var trustStore = new X509Store(StoreName.Root, StoreLocation.LocalMachine); trustStore.Open(OpenFlags.ReadOnly); Intermediate certificates (optional) var intermediates = new X509Certificate2Collection(); intermediates.Add(ctx.LoadCertificate(„intermediate-ca.crt.pem“)); Configure chain builder var chain = new X509Chain(); chain.ChainPolicy.ExtraStore.AddRange(intermediates); chain.ChainPolicy.RevocationMode = X509RevocationMode.NoCheck; Only chain building first chain.ChainPolicy.VerificationFlags = X509VerificationFlags.AllFlags; Only build chain Build chain bool built = chain.Build(serverCert); Console.WriteLine($„Chain Building: {(built ? „Successful“ : „Failed“)}“); Console.WriteLine($„Chain length: {chain.ChainElements.Count}“); foreach (var element in chain.ChainElements) { Console.WriteLine($„ {element.ChainElementStatus.Length} Status“); Console.WriteLine($„ Subject: {element.Certificate.Subject}“); Console.WriteLine($„ Issuer: {element.Certificate.Issuer}“); } </code> —- ===== Automatic AIA Fetching ===== Authority Information Access (AIA) enables automatic downloading of missing intermediate certificates: <code csharp> public X509Certificate2Collection FetchIntermediatesViaAia(X509Certificate2 cert) { var intermediates = new X509Certificate2Collection(); var current = cert; while (true) { Read AIA extension var aiaUrl = GetCaIssuersUrl(current); if (string.IsNullOrEmpty(aiaUrl)) break; Download issuer certificate using var http = new HttpClient(); var certData = http.GetByteArrayAsync(aiaUrl).Result; var issuer = new X509Certificate2(certData); intermediates.Add(issuer); Self-signed = Root reached if (issuer.Subject == issuer.Issuer) break; current = issuer; } return intermediates; } private string? GetCaIssuersUrl(X509Certificate2 cert) { var aia = cert.Extensions[„1.3.6.1.5.5.7.1.1“]; AIA OID if (aia == null) return null; Parse AIA (simplified) var asnData = new AsnReader(aia.RawData, AsnEncodingRules.DER); … Extract CA Issuers URL return null; Implementation depends on ASN.1 structure } </code> —- ===== Chain Building with PQ Certificates ===== <code csharp> public class PqChainBuilder { public X509Chain BuildPqChain(X509Certificate2 endEntity, PqCryptoContext ctx) { var chain = new X509Chain(); Enable PQ-specific validation chain.ChainPolicy.ApplicationPolicy.Add(new Oid(„1.3.6.1.5.5.7.3.1“)); serverAuth chain.ChainPolicy.CertificatePolicy.Add(new Oid(„2.5.29.32.0“)); anyPolicy Custom trust store with PQ root CAs var pqTrustStore = new X509Certificate2Collection(); pqTrustStore.Add(ctx.LoadCertificate(„pq-root-ca.crt.pem“)); chain.ChainPolicy.CustomTrustStore.AddRange(pqTrustStore); chain.ChainPolicy.TrustMode = X509ChainTrustMode.CustomRootTrust; chain.Build(endEntity); return chain; } } </code> —- ===== Chain Building Troubleshooting ===== ^ Status ^ Meaning ^ Solution ^ | PartialChain | Intermediate missing | Use AIA or add manually | | UntrustedRoot | Root not in trust store | Add root to trust store | | NotSignatureValid | Signature invalid | Certificate corrupted/wrong | | RevocationStatusUnknown | CRL/OCSP unreachable | Adjust revocation check | <code csharp> Analyze chain status foreach (var element in chain.ChainElements) { foreach (var status in element.ChainElementStatus) { Console.WriteLine($„ {element.Certificate.Subject}“); Console.WriteLine($„ Status: {status.Status}“); Console.WriteLine($„ Info: {status.StatusInformation}“); } } </code> —- ===== Industry-Specific Requirements ===== ^ Industry ^ Chain Depth ^ Trust Store ^ Specifics ^ | WebPKI | Max. 3 | Browser Root Store | CA/B Forum Rules | | Enterprise | Variable | Custom Root Store | Own hierarchy | | Energy/SCADA | 2-3 | Offline Store | Air-gap systems | | Healthcare | 3-4 | Qualified TSP | eIDAS-compliant | —- ===== Related Scenarios ===== ^ Relationship ^ Scenario ^ Description ^ | Next Step | 5.2 Chain Validation | Complete validation | | Prerequisite | 1.4 Trust Store | Trust anchors | | Related | 5.3 Revocation Check | Revocation verification | —- « <- Validation Overview | ^ Scenarios | 5.2 Chain Validation -> »

—- Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional

Zuletzt geändert: on 2026/01/30 at 12:31 AM

Powered by DokuWiki