I was referring to the -setalias, -addtrust, -addreject, -clrtrust,
-clrreject, -trustout, etc.. If I get a cert from someone, and it
doesn't have the necessary trust/extensions some app
requires, I can simply add them.  Which to me sounds
like those trust settings and/or extensions can't
really be trusted, and any app that does so is broken.

cj

----- Original Message -----
From: "Jason Haar" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 25, 2002 10:06 PM
Subject: Re: Combine certificates into chain


> On Mon, Nov 25, 2002 at 01:00:18PM -0500, Chris Jarshant wrote:
> > Another asounding fact IMO is that most of the software
> > written today looks for attributes (unsigned of course)
> > like s/mime flags, NsCert garbage, and a host of other
> > extensions that make certs usable for one use or another.
>
> Huh? Are you refering to the security hole in IE (and others) that allows
> people to alter chained certs? That's a separate issue.
>
> As far as I'm aware, you *can't* just alter the characteristics of a cert
to
> your whim: you'd break the checksum which *breaks* the signing of that
cert.
> I'd be surprised if any product would be as broken as to allow that...
>
> --
> Cheers
>
> Jason Haar
> Information Security Manager, Trimble Navigation Ltd.
> Phone: +64 3 9635 377 Fax: +64 3 9635 417
> PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to