On Sat, Mar 05, 2005, Erwann ABALEA wrote:

> Bonsoir,
> 
> 
> >             X509v3 Authority Key Identifier: 
> >                
> > keyid:FF:78:E3:03:37:8D:EA:0F:1D:ED:B0:C7:D2:48:49:C6:90:D1:D5:B0
> 
> Problem. The issuer of this certificate doesn't have any
> subjectKeyIdentifier extension, so this authorityKeyIdentifier
> extension is useless, and could potentially be misused. I know that
> Mozilla doesn't use the AKI to find the issuing cert, and MSIE does.
> But I haven't tested the case where an AKI existed without the
> corresponding SKI.
> 
> > This is the ROOT CA's Cert:
> > 
> > Certificate:
> >     Data:
> >         Version: 1 (0x0)
> 
> That's why you don't have any extension on this certificate, it's a
> version 1 certificate. Today, that type of certificates should really
> be avoided unless serious reasons to use them exist.
> 

Ah, I'd missed that! How on earth was that intermediate CA created?

OpenSSL shouldn't be including an AKID extension if the root CA doesn't have
one. 

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to