Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs

2006-10-01 Thread Anders Rundgren
@lists.mozilla.org Sent: Friday, September 29, 2006 14:35 Subject: Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs The trust anchor (i.e., the root CA) authenticates itself, as well as the certificates it issues to other entities. A better diagram and way of looking at it would

Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs

2006-09-29 Thread Kyle Hamilton
The trust anchor (i.e., the root CA) authenticates itself, as well as the certificates it issues to other entities. A better diagram and way of looking at it would be thus: anchor (.) - trust level / \ root subca - authentication level / \ subsubCA endentity It's

Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs

2006-09-28 Thread Jean-Marc Desperrier
Anders Rundgren wrote: [...]. That Root is actually signed by the same key and having the same issuer as Sub does not put it in the same level as Sub since Root is selfsigned. I think you should rethink about the meaning of *self*-signed. The issuer of Root *is* Root, so Root and Sub *do*

Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs

2006-09-28 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: Anders Rundgren wrote: [...]. That Root is actually signed by the same key and having the same issuer as Sub does not put it in the same level as Sub since Root is selfsigned. I think you should rethink about the meaning of *self*-signed. The issuer of Root *is*

Re: CA serial number clarification. Re: Mozilla's use of AIA caIssuers URIs

2006-09-28 Thread Anders Rundgren
Jean-Marc Desperrier wrote: [...]. That Root is actually signed by the same key and having the same issuer as Sub does not put it in the same level as Sub since Root is selfsigned. I think you should rethink about the meaning of *self*-signed. I don't claim to be the world's biggest expert on

Re: Mozilla's use of AIA caIssuers URIs

2006-09-27 Thread Nelson B
Anders Rundgren wrote: NSS (and therefor mozilla products) do not do automatic fetching of certificates at this point in time. Currently all protocols have a way of transmitting the necessary intermediate certificates, and mozilla products depends on these protocols. In theory yes, in

Re: Mozilla's use of AIA caIssuers URIs

2006-09-27 Thread Bob Relyea
Anders Rundgren wrote: Both your root.cert and cacert.cert seem to have same serial number and issuer. That is forbidden. AFAIK each CA has its own serial number space. This should make it OK to reuse a serial number even within a CA hierachy. I would be an error if I let the root

Re: Mozilla's use of AIA caIssuers URIs

2006-09-27 Thread Anders Rundgren
Any two certs with the same issuer must have different serial numbers. I have never claimed anything else. This is a basic X509 requirement, violating this will cause you interoperability problems. If you reissue your CA cert, it must have a new number. If you spin up another CA with the

Re: Mozilla's use of AIA caIssuers URIs

2006-09-27 Thread Anders Rundgren
Nelson wrote: NSS (and therefor mozilla products) do not do automatic fetching of certificates at this point in time. Currently all protocols have a way of transmitting the necessary intermediate certificates, and mozilla products depends on these protocols. In theory yes, in practice no.

Re: Mozilla's use of AIA caIssuers URIs

2006-09-26 Thread Anders Rundgren
Thank you for your prompt reply. Bob wrote: NSS (and therefor mozilla products) do not do automatic fetching of certificates at this point in time. Currently all protocols have a way of transmitting the necessary intermediate certificates, and mozilla products depends on these protocols. In