On 10/07/2009 10:09 PM, Nelson B Bolyard:
Kyle,  Eddy claims that Firefox checks the user's own local cert for
revocation.  I claim it does not.  I claim that it neither checks the
cert for revocation,

Did you check? Try OCSP hard fail...I'm not against it at all, just the messages must improve a bit perhaps.

  nor that the cert has a valid chain up to a CA
trusted to issue client certs.

That's perhaps catchy to some extend. I believe for client cert auth the browser must trust the root to where it connects to, I've never tried to use an untrusted cert at our authentication since it requires hard requirement.

   It does check for expiration of the client's
cert, and of course, it only sends certs that are issued by the
CAs named by the server (when the server names any CAs) because that is
a requirement of the SSL/TLS protocol.

Right.

And in the absence of
that trust, checking a cert for revocation is pretty tough. :)

Check it out. If the root is trusted and the client cert has an OCSP AIA URI it checks.

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:    start...@startcom.org
Blog:    http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to