On Mon, Apr 09, 2012 at 12:01:18PM -0400, Daniel Kahn Gillmor wrote: > >> Can you propose a mechanism such that this info would not get lost? > > > > X509 has a way to embed the trust in the certificate itself, see > > "TRUST SETTINGS" in openssl's x509 manpage. > > This looks like it only works with PEM output, and it appends chunks of > (base64-encoded) ASN.1 data after the initial base64-encoded ASN.1 blob > of the certificate. The header and footer of the PEM output changes > from -----BEGIN CERTIFICATE----- to -----BEGIN TRUSTED CERTIFICATE----- > which makes it so the certificate apparently can't be read by NSS's > certutil. A cursory search doesn't turn up any sort of spec for > -----BEGIN TRUSTED CERTIFICATE----- ; do you know if that's documented > somewhere?
>From looking at the openssl source, it actually seems to allow to use of "BEGIN CERTIFICATE" for ceritificates with trust information (X509_AUX), and I'm not sure why they added the TRUSTED part. I assume that it's not supported for DER because the X.690 standard doesn't allow it, and so they changed it so that only applications knowing how to deal with them would read the files. Anyway, if we really want to go this way NSS will need to be modified anyway. Other libraries might also need to be updated to be able to support reading those files, and doing something useful with the extra information that is in them. Kurt -- To UNSUBSCRIBE, email to debian-policy-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120409164219.ga14...@roeckx.be