X.500 Standard status
(Implementors' Guide)

X.509 Related activities

How to be involved

More Information

Tutorial section 1
X.500 General

Tutorial section 2
X.509 specific

Other PKI organizations

edit SideBar

Search

Defect Reports

This Defect Register contains a list of defects, opened and resolved.

To submit a new Defect Report please click here.

For newer defect reports, please click here.

DR

Description of Defect

249

Miscellaneous errors

248

ASN.1 error in NHOBSubordinateToSuperior

247

Miscellaneous errors

246

Miscellaneous errors

245

Duplicate tags

244

Clarification of conformance to criticality

243

Miscellaneous errors in X.525

242

Size constraint on SET OF and SEQUENCE OF

241

SerialNumber attribute

240

Miscellaneous errors in X.509

239

Missing imports in X.521 ASN.1 module

238

Wrong reference of string types in X.520

237

ASN.1 errors in X.520

236

Editorial mistakes in X.519 ASN.1 modules

235

Error in X.518 ASN.1 datatype
AccessPointInformation

234

Wrong limitation on request decomposition

233

Minor ASN.1 editorials in the import section of
X.518 ASN.1 modile

232

Small ASN.1 editorial errors in X.511

231

Simple credential ASN.1 errors in X.511

230

The X.501 ASN.1 type issuer is unknown

229

Wrong references and minor ASN.1 errors in
X.501

228

ASN.1 errors in protection feature in X.501

227

Authority Key identifier format

226

CA system operational characteristics

225

Entry Information Selection and extraAttributes

224

The evaluation of a filter to UNDEFINED needs
to be made consistent for the case where access
control is/is not present

223

The naming attribute for an entry should always
be shadowed

222

Policy Mapping

221

Conformance for certificate extensions

220

CRL version number

219

CA certificate and Basic Constraints

218

Certificate Policy Match

217

Use of Operation and Error Code in Security
Parameters

216

CertificateAssertion

215

Access control to changing RDN

214

Use of the term "canonical"

213

CRL matching rules

212

CRL matching rules

211

Y2K corrections

210

Shadowing attribute selection

209

DSA referrals
(duplicate registration 178)

208

Needed ACI when processing List using
knowledge held in superior DSA

207

Problem in the use of the Algorithm object class

206R

Handling extensions for search results

205

Definition of Superior Reference

204

Revoked certificates on CRL past expiry time

203

Entry Information Selection

202

Clarification of CertificationPath in
SecurityParameters

201

Issuing distribution point

200

CRL dist pnts & full CRLs

199

Presence Filter

198

Additions to chaining arguments

197

DSE type bits

196

Validity period

195

Shadowing agreement parameters

194

Validity date

193

Policy constraints

192

Collective attributes and content rules

191

Alias loops

190

Access controls

189

Modify operational binding

188

Add permission and prescriptive ACI

187

sdse Type of root

186

Entry ACI and shadowing

185

Forward and reverse certificates

184

CertificationPath

183

Public key usage

182

Shadowing and one-level searching

181

Shadowing access controls

180

entryOnly inconsistency

179

Clarification in returnDN handling

178

Duplicate of 209

177

Distinguished encoding of UTCTime

176

Acces control on aliases

173

NSSRs in the root directory

170

Entry selection in search proceedure

169

Permutable property for PKCS

168

Protected Password

166

Alias control by alias dereferencing

164

ASN.1 of SupplierUpdateMode

163

Shadowed information proceedure

162

APInfo proceedure

159

targetObject in Search (I) proccedure

157

ModifyDN and UnitOfReplication

Page Actions

Recent Changes

Group & Page

Back Links