Jan Meijer wrote:
> 
> 
> Well, in PGP the fingerprint is defined somewhat like a hashvalue over the
> public key data, the emailaddress and the date (i think).
> 
> When you issue a netscape client certificate the certificate also contains a
> fingerprint.  I do not exactly know what this fingerprint means (perhaps
> someone else does?), but I'd like to know (if it is possible) the
> fingerprint before certifying.  It all has to do with the verification
> process we want to do before certifying a key.
> 

Well no. The Netscape fingerprint if the MD5 hash of the DER encoding of
the certificate (compatible with the -fingerprint option of 'x509') so
by definition you can't determine if before you issue the certificate.

However...

> The process can be described as follows:
> 
> 1. applicant requests certificate (submits public key to enrollment)
> 2. enrollment server sends back key details (things identifying the key for
> 100%) (I know, this can be cracked, we solved it procedureally :)
> 3. CA verifies link between applicant and organisation (it's our office CA)
> 4. CA verifies link between applicant and public key and verifies identity
> of applicant
> 5. CA signs certificate request
> 6. CA handsout certificate
> 
> During 4 the verification of the identity is done fairly easily (passport
> etc.), but the applicant also needs to be sure the key he submitted for
> certification is the key described on the form he is about to sign (the form
> states: Yes, I'm the person described here and yes, what is described here
> in keysize, algorithm and "fingerprint" is MY public key.  Yes, I'm sure.
> Yes, I'm sure, sign my key! Sorry, need to go home.)
> 
> but: I hope I've made my problem clear.  Both the applicant and the CA need
> to know what public key they're talking about.  In PGP there is the
> fingerprint mechanism, in netscape also, but it only works _after_
> certification :(  and I need it before.....
> 

Hmmm this is sort of a Netscape problem. A key that doesn't yet have a
certificate is invisible and cannot be used. After the initial SPKAC
containing the public key and signature you can't get anything else out
of it.

Anyway I gather you want to have the user make sure it is their public
key. However the question is why? If the public key doesn't correspond
to a private key in Netscape's database then it wont install the
certificate.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to