A company's internal CA has issued a root signer cert (there's no intermediate cert acting as signer) in which the DN contains only the C=US and O=company_name and no other DN fields.
The cert signed by this root is used for an IBM MQ instance so the things connecting to it are not comparing the CN to the URI. The one SAN value present matches the cert label in the keystore which IBM defaults to ibmwebspheremq[qmgrname]
so the SAN wold not match the URI, the QMgr name, or anything else a connection requestor would expect.
- The JEE apps connecting to this server using a variety of JEES providers don't complain.
- OpenSSL validation using s_client succeeds.
- IBM GSKit fails to validate the personal cert in the local KDB (IBM's keystore format) using this signer. The error cites
An invalid basic constraint extension was found
with theGSKM_VALIDATIONFAIL_SUBJECT
citing the IssuerName and Issuer but shows them with identical values.
I'm wondering whether this DN, in particular the missing CN, is considered non-compliant. Or, more to the point, it obviously works with some crypto providers but should I expect it to fail with any that validate more strictly?