Hi Bob

> 1) the user has multiple certs with the same subject, but some certs map 
> to different roles (evil IMHO).

But you can find this constellation in many "business" PKI. The identity 
of an user (his name or employee number) is taken as the cn= to match 
the local directory structure (eG. company LDAP or ADS). But for 
security reasons you need multiple keypairs and therefore also multiple 
certificates. You must be sure, that his secret signing key is only on 
his smartcard, so you generate this keypair on the card. For the 
encryption keypair you must be sure to have a backup otherwise the lost 
or damage of the smartcard results in data loss. That's why often users 
have two different certificates (encryption and signing/authentication) 
with the same subject in the certificates.
It's the job of the applications to select the right certificate 
according to the keyUsage (and extendedKeyUsage).
So IMHO this is not "evil"  ;-)

> I think resolving this will take some thought so we don't break existing 
> applications (perhaps adding a new friendly name parallel with out 
> nickname which can be different even if the subject is the same).

I think it might be best to set the CKA_LABEL of every imported 
certificate to the friendlyName of the PKCS#12 container. If the 
friendlyName is not set, the CommonName should be the right choice.

Regards
Ulf

-- 
Ulf Leichsenring
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to