Hi Patrick,

Thank you for your kindly reply.

I will do more research and test based on your advice. Actually, I want to
know which rules openssl has done, which should i implement in callback
function.

1.We make sure the chain we are going to build is present and that the first
entry is in place.
    2.Verify the depth
    3.Check a certificate chains extensions for consistency with the
supplied purpose
    4.Check the last certificate trust in the chain
    5 Check revocation status: we do this after copying parameters because
they may be needed for CRL signature verification.


On 18/04/2008, Patrick Patterson <[EMAIL PROTECTED]> wrote:
>
> Hi Anri:
>
>
> Anri Lau wrote:
> > Hi All,
> >
> > Anyone know how many rules should be performed when build TLS
> connection?
> > I have some test case. The certificate time is not valid, validation
> failed.
> > But the certificate passed if the validity dates of the child
> certificate
> > are not contained within the validity
> > dates of the parent certificate.
> >
> > As i know, both of above are the standard rules of digital certificate.
> >
> > So, which rules will be performed in OpenSSL, when build the TLS
> connection.
> >
> >
>
> I believe that the above are what is performed, as well as, if you
> provide the appropriate information, CRL validation (and, I believe,
> OCSP can be added into the mix)...
>
> However, OpenSSL does not *YET* perform full RFC3280 compliant Path
> Validation and Discovery (checking for Name Constraints, Policy
> compliance and mapping, AIA Chasing, etc.) - for that you need to either
> do all of the implementation yourself, or use a tool like Pathfinder
> (http://www.carillon.ca/products/pathfinder.php) that performs all of
> this validation for you, and which ties into the OpenSSL certificate
> verification callback.
>
> Depending on the complexity of your trust environment (Pathfinder was
> written to handle just about every case, including complex Bridge PKI
> environments), you may not need that, and simply ensure that your code
> reads the CRL Distribution point information in the certificate, and
> either fetches the CRL, or uses a cached, but still valid copy of the
> CRL, as then rely on the reasonably complete (for a simple trust
> environment) implementation that is currently in part of the stock
> certificate verification callback.
>
> Have fun.
>
> --
>
> Patrick Patterson
> Chief PKI Architect
> Carillon Information Security Inc.
> http://www.carillon.ca
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>



-- 
Best regards to you and your family

Reply via email to