Nelson Bolyard wrote:
> Your proposal would require storing the equivalent of a name constraints
> extension along with the root CA cert.  It would also require additional
> processing, because name constraints are generally not processed inside
> trust anchors.  That is, usually a CA puts the name constraints extension
> into subordinate CA certs that it issues, and a root CA does not attempt
> to constrain itself.  Standard RFC 3280 cert chain validation does not
> expect the "trust anchor" (root) to have any such constraints, and the
> algorithm in that standard does not use such into in a root cert, if present.
> 
> (As an aside, EV also requires non-standard behavior and if implemented in
> NSS would also require similar (though fewer) non-standard extensions.  EV
> requires the storage of one or more EV policy OIDs that are permitted to be
> used in certs issued by the root CA and its subordinates. 

And it is planned (is there a plan?) to store this information using the 
vendor-defined extensions you mentioned in your message?

Where does NSS/PSM store the values of the three checkboxes you can set 
through the UI to decide whether a cert is trusted for web/SSL/code?

> Alternatively these non-standard extensions could be implemented in PSM.
> PSM would be free to store the information in any non-standard format
> it likes.  After a cert chain has been validated by NSS's cert path
> validation code, PSM could do additional checks on policy OIDs and/or
> RFC 822 names according to the rules/info it has stored.

(Question repeated for completeness)

I presume it has access to the information it would need via the API?

> Since mozilla clients are likely the only NSS-based applications that
> will want these extensions, I think a case can be made that these
> extensions should be done in PSM rather than in NSS.

My concern about implementing it "on top of" NSS is that, as I 
understand it, it would require a parallel database to be kept of 
"certificate metadata". Would this not raise architectural objections?

Gerv
_______________________________________________
dev-tech-crypto mailing list
[EMAIL PROTECTED]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to