Hello Jehan:

In answer to your question on certificate path construction, there is,
in fact, a standard - first of all, this is now collectively known as
Path Discovery and Validation, and the canonical algorithm for a PKIX
compliant PKI is in RFC5280 (a previous, and slightly more ambiguous
algorithm is in RFC3280). Second, there are several implementations -
take a look at the NIST PDVal working group. If you are running Unix,
then you may be able to use Pathfinder (full disclosure - it is a
project sponsored by my company), and have it handle your trust fabric
resolution:

http://code.google.com/p/pathfinder-pki/

As for how to correctly build the profiles for PKI, given that you are
in France, I would suggest contacting the PRIS, and they have published
a compendium of the profiles that are suggested for doing PKI in France.
For other jurisdictions, you may want to take a look at the profiles
published in the Certificate Policies of the US Federal Bridge CA, the
Canadian Government PKI, CertiPath, and SAFE.

Have fun.

Patrick.

jehan procaccia wrote:
> hello,
> in a recent thread on this list about "add extension to an existing
> (signed) CA certificate" I was wondering how openssl software validate a
> certificate chain.
> jehan procaccia wrote :
>> Can someone tell me how SSL clients check/verify a 3 level hierarchie ?
>> is it based on  extension authorityKeyIdentifier ?
>> At a specific level (1/2/3) it must match keyid ? and /or issuer
>> (DirName humane readable ) ? and/or serial of  it's  near (just above)
>> parent ?
>> is this procedure clarified somewhere ?
> I finally found this presentation:
> http://www.oasis-pki.org/pdfs/Understanding_Path_construction-DS2.pdf
> which starts by telling
> "The certification path construction process has not been standardized,
> and there is very little published information available"
> 
> Well, since that publication date from 2002, I wonder if there are new
> recomandation/practice and perhaps real standard way to build and verify
> a certification path nowdays?
> 
> From that same thread ("add extension to an existing (signed) CA
> certificate") you would understand that my actual PKI root-ca probably
> needs to be re-builded from scratch (sub-sub-ca and all leaf certs :-(
> as well ) beacause is lacks "basic constraint CA:TRUE" at the root .
> so I want this time to start on good practice , notably for the
> extensions .
> Root-CA shoud have: (idem for sub-ca ?)
> 
> [ROOT_CA]
> nsComment                       = "root CA"
> subjectKeyIdentifier            = hash
> #authorityKeyIdentifier          = keyid:always,issuer#? maybe not that
> one for root-ca, only for sub-ca
> basicConstraints                = critical,CA:TRUE
> keyUsage                        = keyCertSign, cRLSign
> 
> Thanks.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to