Balint Balogh wrote:
Hello

In general, this cannot be done.  It is possible to put "name constraints"
on CAs that are subordinate to a root CA, but not generally on root CAs.
I was afraid of getting an answer like this but thanks for replying anyway. :)
This is the general problem PKIX and cross certificates are supposed to solve.

In the PKIX model you would create a new intermediate with the same subject and keys as the root cert you want to trust. You would then add constraint extenstions to the intermediate to limit what name spaces it can use (and what policies it can issue). That allows you to extend limitted trust to other certificate domains.

PKIX is currently planned for NSS 3.12, so won't be available in any mozilla based products this year.

bob

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to