In message <[EMAIL PROTECTED]> on Fri, 24 Sep 2004 14:22:06 +0400, Toxa <[EMAIL 
PROTECTED]> said:

postfix> > All the arrows shows what the cerificates can verify.  It should be
postfix> > easy to see that any path going down from CA0 is impossible, because
postfix> > there's nothing that can verify CA0c1 except for CA0c1 itself.  The
postfix> > obvious choices for points of trust are CA0c1 or the user's own CA
postfix> > certificate, giving the following possibilities for users in the CA1
postfix> > realm:
postfix> 
postfix> >   point of trust = CA0c1 (the cross certification is entirely
postfix> >   pointless in this case, BTW):
postfix> 
postfix> >     [CA0c1] -> [CA2c1] -> [CA2U{x}]
postfix> 
postfix> >   point of trust = CA1c1:
postfix> 
postfix> >     [CA1c1] -> [CA2c2] -> [CA2U{x}]
postfix> 
postfix> Yes, now I see that [CA1] -> [CA0] -> [CA2] is a completely
postfix> wrong path, but, at last, what will be the chain if I am the
postfix> user of CA1, and the user of CA2 gave me his certificate.
postfix> The situation remains the same, e.g. CA1 and CA2 are both
postfix> still cross-certified and subordinated by CA0. You point the
postfix> choices:
postfix> 
postfix> [CA0c1] -> [CA2c1] -> [CA2U{x}]
postfix> [CA1c1] -> [CA2c2] -> [CA2U{x}]
postfix> 
postfix> 
postfix> But it is impossible to see two chains in certificate in one
postfix> time, right?

Not entirely.  It all depends on what points of trust the user has.
Read again what I wrote (quoted above), and note that I have the two
choices depend on the point of trust (i.e. what root certificate the
user has in his list of trusted roots).  Now, the reason I say "not
entirely" is that a user in this example might have both CA0c1 and
CA1c1 in his list of trusted roots.  It's up to the application to
handle that, and unfortunately, not all applications know how to.

postfix> And as I can understand you, both are correct. This wonders
postfix> me. Does the chain depends on something else? How can I
postfix> control it? How can I choose between those two paths?

The choice is with the user and exactly what they import.

postfix> Remebmer, users has both cross-certificate and  root CA0
postfix> certificate imported (in case the chain depends on present
postfix> certificates user has imported).

Why on earth should all users need to have both cross certificates?
And if they have CA0c1 as a point of trust, why on earth would they
need anything else at all?  There's absolutely no need for all users
to have all those certificates at once.  If you do that, then you'll
end up with a mess, and possibly with confused software (as I said,
not all applications know how to handle branches in verification
paths).

Cheers,
Richard

-----
Please consider sponsoring my work on free software.
See http://www.free.lp.se/sponsoring.html for details.

-- 
Richard Levitte                         [EMAIL PROTECTED]
                                        http://richard.levitte.org/

"When I became a man I put away childish things, including
 the fear of childishness and the desire to be very grown up."
                                                -- C.S. Lewis
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to