Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Julien R Pierre - Sun Microsystems
Edy, Eddy Nigg wrote: > > Neither Apache not IIS do that AFAIK. I believe the Netscape/iPlanet/Sun web server does at least log a warning when the server comes up if the cert cannot be verified, for example, because of a missing intermediate. However, if the intermediate cert was installed, b

Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Wan-Teh Chang
On Thu, Jul 24, 2008 at 5:37 AM, Jean-Marc Desperrier <[EMAIL PROTECTED]> wrote: > > For exemple about the shareable database, your response late in February > about that was that there was still a lot left to do for it, and that > you didn't see the point unless both Fx and Tb had it and it could

Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Nelson B Bolyard
Jean-Marc Desperrier wrote, On 2008-07-24 05:37: > For exemple about the shareable database, your response late in February > about that was that there was still a lot left to do for it, In NSS, yes. That work was completed, as planned. > and that you didn't see the point unless both Fx and

Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-07-24 01:15: > Nelson B Bolyard: >> I believe that, within the Mozilla developer community, there is a widely >> held misconception that NSS=PSM and the NSS team is the PSM team. But >> that's really not correct. Most of the NSS developers are paid to work >> on NSS but

Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: > Eddy Nigg wrote, On 2008-07-23 14:30: >> Nelson B Bolyard: >>> [...], when it sends the http get request to fetch the cert, it has >>> not yet validated the cert from which it got the http URL, so it doesn't >>> know if that URL is legitimate or from some hacker. It blind

Re: question about certificate chain from https://suppliers.intel.com

2008-07-24 Thread Eddy Nigg
Nelson B Bolyard: > > Only if the server cert is from a CA that follows a reasonable CP/CPS. > Obviously... > The case of concern is the server with a self-signed cert, or cert from > an unknown CA, that has an AIA extension that points to a tracking host > of some sort. The chain won't validate

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-07-23 14:30: > Nelson B Bolyard: >> Note that, when it sends the http get request to fetch the cert, it has >> not yet validated the cert from which it got the http URL, so it doesn't >> know if that URL is legitimate or from some hacker. It blindly fetches >> whatever th

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Anders Rundgren
-critical extension, NIST requires the support of this in PIV, and IMO for very good reasons. Anders Rundgren - Original Message - From: "Eddy Nigg" <[EMAIL PROTECTED]> Newsgroups: mozilla.dev.tech.crypto To: Sent: Wednesday, July 23, 2008 18:26 Subject: Re: question about c

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Eddy Nigg
Nelson B Bolyard: > > Note that, when it sends the http get request to fetch the cert, it has > not yet validated the cert from which it got the http URL, so it doesn't > know if that URL is legitimate or from some hacker. It blindly fetches > whatever the server at that URL sends it. Quite a few

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-07-23 08:26: > IE fetches CA certificates on its own if a service URL of the CA issues > is present in the parent certificate, but NSS doesn't for now. Rather, Firefox 3 does not use the facility of NSS that is capable of fetching certs in that fashion. NSS 3.12 has lo

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Nelson B Bolyard
Eddy Nigg wrote, On 2008-07-23 09:26: > Well, the RFC requires the server to send any chained CA certificate up > to the CA root. The server doesn't have to send the root CA certificate > itself however. Correct. The TLS RFC requires that the server sends the chain. The fact that it is now po

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Eddy Nigg
Nelson B Bolyard: > Eddy Nigg wrote, On 2008-07-23 08:26: > >> IE fetches CA certificates on its own if a service URL of the CA issues >> is present in the parent certificate, but NSS doesn't for now. > > Rather, Firefox 3 does not use the facility of NSS that is capable of > fetching certs in that

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Eddy Nigg
Peter Djalaliev: > Ah, I see. From what I can see in the RFC, this usage is not really > forbidden, but not really standard either. Generalizing my question, > what kind of X509v3 extensions that NSS currently support? I am aware > that CA often use these extensions in less-than-standard ways :)

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Peter Djalaliev
Ah, I see. From what I can see in the RFC, this usage is not really forbidden, but not really standard either. Generalizing my question, what kind of X509v3 extensions that NSS currently support? I am aware that CA often use these extensions in less-than-standard ways :) Peter On Jul 23, 11:2

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Eddy Nigg
Eddy Nigg: > IE fetches CA certificates on its own if a service URL of the CA issues /issues/issuer/ -- Regards Signer: Eddy Nigg, StartCom Ltd. Jabber: [EMAIL PROTECTED] Blog: https://blog.startcom.org ___ dev-tech-crypto mailing list dev-tech-cryp

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Eddy Nigg
Peter Djalaliev: > Hello, > > I tried connecting to http://suppliers.intel.com (which redirects to > https://supplier.intel.com/supplierhub) from Firefox 3 and IE7 and saw > two different certificate chains when I tried to view the server > certificate. IE7 recognized the root certificate as comin

Re: question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Peter Djalaliev
The correct initial URL is http://supplier.intel.com, redirected to https://supplier.intel.com/supplierhub ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

question about certificate chain from https://suppliers.intel.com

2008-07-23 Thread Peter Djalaliev
Hello, I tried connecting to http://suppliers.intel.com (which redirects to https://supplier.intel.com/supplierhub) from Firefox 3 and IE7 and saw two different certificate chains when I tried to view the server certificate. IE7 recognized the root certificate as coming from a trusted issuer, whi