Nelson B wrote:
Jean-Marc Desperrier wrote:
In my tests, Communicator 4.x did not enforce the restriction you describe in all case.
If the intermediate/root CA certs had no netscape cert type extension at all, it was possible to enable then for "object signing" without problems, despite a description implying they were required to explicitly have it.

Very interesting. That would be a pretty serious flaw, and would (I think) weaken the relative strength of the "Object Signing" OID (as compared to the Code Signing OID).

I don't get how it weakens the "Object Signing" OID with regards to "Code Signing OID".


It's the same behaviour as "Code Signing OID" where only the signing cert requires the OID.
In fact, everything is similar to Microsoft implementation of "Object Signing" where one can too use the extended key usage to restricts the ability of the CA to emit or not "Object Signing" certs, even if this kind of use is not endorsed by pkix (I asked them when I was actually interested in this and did the above test, and the consensus was eku should apply to the cert, and not be herited when used for a CA cert, and if this kind of CA restriction was really useful then a new key usage would be better than diverting eku from it's original intend).
_______________________________________________
mozilla-crypto mailing list
[EMAIL PROTECTED]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to