[DBWG] Nonconformant X.509 issuer+subject names in some Afrinic RPKI CA/EE certs
Frank Habicht
geier at geier.ne.tz
Tue Nov 18 05:09:29 UTC 2025
Dear AfriNIC (staff) team,
Would there be anything speaking against re-issuing those problematic
objects ?
This will mean that all RPKI information published by AfriNIC will comply.
I believe the intentions of the issuers (resource holders) are clear and
all parameters (validity duration etc) can be preserved.
Thanks,
Frank Habicht
[DBWG co-chair]
PS: Yes, there might be other mailing list applicable as well, but
please include this list / WG in your answer ;-)
Hoping that this can be worked on and resolved swiftly, we're awaiting
staff's input/updates.
On 11/17/2025 5:03 PM, Job Snijders wrote:
> Dear all,
>
> Almost 3 years ago I reported a RPKI standards compliance issue with the
> way AfriNIC's RPKI system encoded certain text strings. Through
> extensive investigation we learned that the root cause was a
> configuration error caused by a documentation bug in OpenSSL.
>
> Since then, the OpenSSL project corrected its documentation, release new
> versions of their software, and AfriNIC started using an updated
> configuration through which the issue was mitigated - for new object
> issuances going forward. All positive steps towards resolution.
>
> Since 2023, rpki-client project have repeatedly requested AfriNIC to
> re-issue all remaining problematic objects in order to be able to remove
> an exception in rpki-client's codebase. A substantial number of objects
> have been re-issued, but not all. The rpki-client project considers it
> highly undesirable to continue carrying special case code to carve out
> an exception for AfriNIC's past configuration issue. We'd very much like
> to resolve this matter fully and close the case.
>
> As of today, there still are 988 objects which contain a nonconformant
> X.509 issuer name and 657 objects which contain a nonconformant X.509
> subject name. See https://validator.afrinic.net/rpki/rcynic/rpki.afrinic.net.html
> for an up to date overview.
>
> There list of affected prefixes is attached to this email in the file
> "afrinic-nov-2025-nonconformant-vrps.txt"
>
> Should the RPKI-client project moves forward with removing the special
> case exception, the number of Validated ROA Payloads under the AfriNIC
> trust anchor would temporarily reduce from 21,027 to 19,480 Unique VRPs
> (until the associated ROAs are reissued).
>
> The effect on the global Internet routing system would be that about
> 6,000 BGP route announcements convert from "valid" to "not-found" and
> would no longer enjoy the benefits of RPKI Route Origin Validation
> protection.
>
> The rpki-client project currently is considering removing the carved out
> exception and accept the unfortunate consequence that a number of BGP
> routes will be considered ROV "not-found", until such time that
> AfriNIC's system has re-issued the associated ROAs.
>
> We'd like to solicit your input on this matter on how to proceed.
>
> Kind regards,
>
> Job
> rpki-client maintainer
>
> On Thu, 16 Mar 2023 19:53:22 +0100, Job Snijders via DBWG wrote:
>> Dear all,
>>
>> While reading RFC 6487 section 4.5, I noticed that all CA certificates
>> representing Afrinic members under the Afrinic trust anchor appear
>> nonconformant with regard to the constraints imposed on the X.509 Subject
>> field.
>>
>> The issue at hand is that the Subject name contains a distinguished name
>> which contains an instance of the CommonName attribute, which MUST be
>> encoded using the ASN.1 type 'PrintableString'. However, in the case of
>> Afrinic's Hosted RPKI solution, all such instances are encoded as
>> UTF8String. No need for emoji's in this particular data field! :-)
>>
>> I think the solution would be to change the issurance code that produces
>> value of the Subject - to use PrintableString instead of UTF8String, and
>> then re-issue all CA certificates and Signed Objects.
>>
>> As far as I can see, the Afrinic RPKI platform is the only system in the
>> global ecosystem which produces nonconformant issuer & subject names in
>> this particular way; therefor a resolution to this issue would allow all
>> Relying Party implementations to impose more strigent conformity checks
>> after this has been resolved.
>>
>> Kind regards,
>>
>> Job
>>
>> References:
>> Specification: https://www.rfc-editor.org/rfc/rfc6487.html#section-4.5
>> Another observation point: http://validator.afrinic.net/rpki/rcynic/rpki.afrinic.net.html
>> ("Nonconformant X.509 issuer name" and "Nonconformant X.509 subject name")
>>
>> ps, one example:
>>
>> $ openssl asn1parse -in rpki.afrinic.net/repository/afrinic/muu9NJ1kyzF42IIOBBzyKn9pnok.cer -inform der -i -strparse 135
>> 0:d=0 hl=2 l= 72 cons: SEQUENCE
>> 2:d=1 hl=2 l= 19 cons: SET
>> 4:d=2 hl=2 l= 17 cons: SEQUENCE
>> 6:d=3 hl=2 l= 3 prim: OBJECT :commonName
>> 11:d=3 hl=2 l= 10 prim: UTF8STRING :F366EFDFAF <#### ERROR, should be PRINTABLESTRING
>> 23:d=1 hl=2 l= 49 cons: SET
>> 25:d=2 hl=2 l= 47 cons: SEQUENCE
>> 27:d=3 hl=2 l= 3 prim: OBJECT :serialNumber
>> 32:d=3 hl=2 l= 40 prim: PRINTABLESTRING :9AEBBD349D64CB3178D8820E041CF22A7F699E89
>>
>>
>> From: yogesh at afrinic.net (Yogesh Chadee)
>> Date: Fri, 17 Mar 2023 10:37:03 +0400
>> Subject: [DBWG] Nonconformant X.509 issuer+subject names in almost all Afrinic RPKI CA/EE certs?
>>>
>>> Good morning.
>>>
>>> Thank you very much for the detailed explanation, references, and the
>>> test case.
>>>
>>> We would like to advise that we are working to resolve this bug as soon
>>> as possible and we will advise this list once it is resolved.
>>>
>>> Best regards,
>>>
>>> Yogesh Chadee
>>>
>>> AFRINIC
>>>
>>> _______________________________________________
>>> DBWG mailing list
>>> DBWG at afrinic.net
>>> https://lists.afrinic.net/mailman/listinfo/dbwg
More information about the DBWG
mailing list