"Salz, Rich" <[EMAIL PROTECTED]> writes:

> >It won't always be the case that your directory structure will map
> >_exactly_ to your certificate heirarchy.
> 
> So you need a general filtering of subjectDN to LDAPDN, I guess.  We've
> come across this issue. Our circumstances are a little different from
> yours, since the product (here) is a repository, not using an external
> directory. So we can say things like "we will rewrite the DN to be
> c/o/ou/l/cn allowing multiple ou's and ignoring all other attrbiutes."
> Whereas your code probably has to allow flexibility in rewrite rules.

Yup, I want this to be able to work with any LDAP server out there and any
layout the user chooses.

> >But if you want to use something like Verisign to get your certificates,
> >their certs are pretty nasty looking and I would _not_ want my directory
> >to look like that. :)
> 
> Yeah, the longer CA folks have been in business, the more they do things
> beyond the PKIX profile. (No surprise in that.)
> 
> >Either as an RDN in the cert, or an extended attribute.  Verisign's
> >low-assurance CA sticks your email in there.
> 
> It's amazing what people put in their DN's. We've seen certs that have a
> copyright notice in them.

The Verisign certs have a great big comment in them about the
`Certification Practice Statement' - ~750 bytes of legalese.  Gotta love
it.

> It's an interesting exercise to find the official oid of the email rdn. :)

My coworker who does all the serious crypto was just lamenting that fact on 
the phone. :)

-Bill P.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to