* Joseph <syscon...@gmail.com> [2010-10-23 12:50 -0600]:

I'm using command:
openssl s_client -connect pop.gmail.com:995 -showcerts

and it printed out:

--------copy---------------
CONNECTED(00000003)
depth=1 C = US, O = Google Inc, CN = Google Internet Authority
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=pop.gmail.com
  i:/C=US/O=Google Inc/CN=Google Internet Authority
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----
1 s:/C=US/O=Google Inc/CN=Google Internet Authority
  i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----
[...]
So I assume the first one is gmail.pem certificate
the second was was equifax.pem certificate

No. Both of those were sent by the Google server. The first is for the server, and was issued by Google's own signing authority. The second
is the Google signing authority certificate, which is issued by Equifax.
Note the s: and i: lines for each cert.
(It's complicated but allowed by the standards.)

If the server were allowed to send a copy of a certificate authority's cert as well as the server one, a bad guy could just forge the whole chain and you'd accept it and never be the wiser. You're supposed to get independent verification of the validity of the certificate chain. That usually means that you get the cert from your OS vendor at install time.

Please don't leave the mailing list off replies.

Breen
--
Breen Mullins
b...@sdf.org

Reply via email to