* Simon McVittie <[email protected]>, 2014-06-17, 13:20:
It should be possible to make a CA certificate that is only considered to be valid for the spi-inc.org and debian.org subtrees, and then trust the assertion that SPI control that certificate - but in widely-used applications, that isn't possible.

In theory, the Name Constraints extension should allow one to achieve what you said:
http://tools.ietf.org/html/rfc5280#section-4.2.1.10
No idea how well it is supported, though.

--
Jakub Wilk


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: https://lists.debian.org/[email protected]

Reply via email to