Nelson wrote:
>>> NSS (and therefor mozilla products) do not do automatic fetching of
>>> certificates at this point in time.
> 
>>> Currently all protocols have a way of transmitting the necessary
>>> intermediate certificates, and mozilla products depends on these protocols.

>> In theory yes, in practice no. If you use TLS client-auth as an example, FF
>> would require that every sub-CA was known in advance by the relying party
>> (server) in order to provide the proper DNs for certificate filtering &
>> selection. 

>No.  In TLS client auth, the server sends out a list of names of CAs that
>it trusts as issuers of client auth certs.  The client is required to send
>a cert in that is issued directly (or indirectly) by one of the CAs named
>by the server.  That is, the client's cert must be issued by a named CA,
>or have a cert chain that "chains up" to a named CA.

Did I say anyhthing else?  The AIA caIssuer extension allows you to
"chain up" automatically.  This very good if you have FIPS201 since
there is just EE-level certs in the cards.  Using mozilla you have
to install the missing path.  But you are going to update this part so
it will work better as Bob explained.

<snip>

> So the server doesn't need to keep any intermediate
>CAs below the ones it trusts; that is, between its own named points of
>trust and the client's EE certs.

Yiu are right, all the burdon is on the client which is the reason why
AIA caIssuers is important to support.

>>> Automatic fetching is a PKIX feature, and is targeted for NSS 3.12.
> 
>> Good!

>But the SSL and TLS protocols will not immediately cease to require the
>sending of the cert chains as previously explained when libPKIX becomes
>available.

No, but you get away from installing local cert paths.  In WASP, I intend
to make full path this optional.  That is, the requster says one or all.

<snip>
>Each CA has its own serial number space, and its own unique issuer name.
>For two different certs to have the same issuer name and same serial numbers
>means that one or more CAs goofed.

My certpath is OK.  So is my understanding of RFC3280

Anders

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to