Jean-Marc Desperrier wrote:
>> [...]. That Root is actually signed by the
>> same key and having the same issuer as Sub does not put it in the same level
>> as Sub since Root is selfsigned.

>I think you should rethink about the meaning of *self*-signed.

I don't claim to be the world's biggest expert on path validation so please bear
with me.

>The issuer of Root *is* Root, so Root and Sub *do* share the same 
>issuer, and they are at the same level.

Since Root is also the issuer of Sub, the consequence of this logic actually
gives a self-signed Root certificate *two* places in a CA hierarchy:

         Root
        /        \
    Root     Sub

This can't hardly be correct.   The problem is as far as I can tell, that the
"issuer" in a self-signed root is actually non-existent from a path-building
point of view.  In fact, there are no rfc3280 requirements saying that trust
anchors (roots) must be certificates at all, a public key is good enough.
If you (as I did) distribute a root as a certificate, this should not change
the validation rules, it is just a convenient way of packaging roots.

Apparently the Mozilla certificate database use the logic you describe
but other parties (MS, Java[keystore] and Adobe) do not according to
my testing. After some consideration, I concluded that this is likely to
be a bug in Mozilla: https://bugzilla.mozilla.org/show_bug.cgi?id=354628

thanx
Anders

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to