Yaron Sheffer writes:
> No, Sec. 1.1.1 of RFC 5652 (which you are quoting) only describes
> the differences between the original PKCS #7 v1.5 and RFC 2630.

I took the text from RFC2630 Abstract, didn't check the later ones in
that much detail to find out the changes since sections... :)

> There follow a few more sections with other bells and whistles
> leading to RFC 5652.

Yes, but I do not think we need any of those bells and whistles. 

> Besides, even if the later RFCs are (mostly) *backward compatible*
> with RFC 2315, they may still be adding useful stuff. This is just
> speculation on my part, not actual knowledge.

The PKCS#7 has been used to just put together buch of certificates and
send them to other end in format that other ends certificate library
can easily parse, and then take the certificates out from the PKCS#7
container and use them to validate the certificate used in the
authentication. This is how it was used in IKEv1 and this is how I
expect it to be used in IKEv2.

I.e. it was mostly what we now have with the certificate bundle, but
that ASN.1 blob was sent inband and using different format. 

In our IKEv1 code we just recursively went through the PKCS#7 blob and
added all certificate and CRLs we found from there to the certificate
manager and then tried to find suitable valid certificate based on the
ID. We never had any code to send those PKCS#7 wrapped blobs, but I do
remember that for some vendors that was almost the only format they
supported (for certificate chains).

My old isakmp test site seemed to have 26 connections using pkcs#7
format to send certs in from 5 different hosts.
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to