Looking at the http://www.win.tue.nl/hashclash/rogue-ca/ attack
specifically...
The Equifax Secure Global eBusiness CA-1 self-signed Root Certificate trust
anchor does *not* contain the Authority Info Access extension or CRL
Distribution Points extension.
The Rogue CA Certificate does *not*
Is there any way I can suck back the last two messages I sent on this thread
and pretend they never happened? sigh I guess not.
Please ignore my assertions about what the AIA extension does: I was completely
wrong. As we were making the AIA extension in the PKIX WG, we discussed
multiple
Paul,
Paul Hoffman wrote:
It seems to me also that a self-signed certificate marked as a trust anchor,
ie. a root, probably shouldn't have an AIA extension.
Wait. No kind of certificate is marked as a trust anchor. I assume you probably me
root as in a self-signed cert with the CA bit
At 3:09 PM +0100 1/5/09, Ian G wrote:
The recent MD5 collision attack has also demonstrated a brittle side of OCSP
[1]:
http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx
It seems that, assuming we can create an intermediate or subroot certificate,
Paul Hoffman wrote, On 2009-01-05 08:54:
At 3:09 PM +0100 1/5/09, Ian G wrote:
[...] Hence, once we rogue-players have created a certificate like this,
the CA cannot revoke it using its own control mechanisms. [...]
I am not convinced the article is correct. If it is correct, it is a
At 4:01 PM -0800 1/5/09, Nelson B Bolyard wrote:
Paul Hoffman wrote, On 2009-01-05 08:54:
At 3:09 PM +0100 1/5/09, Ian G wrote:
[...] Hence, once we rogue-players have created a certificate like this,
the CA cannot revoke it using its own control mechanisms. [...]
I am not convinced the
Paul,
Paul Hoffman wrote:
3) A corollary of (2): Even when parent == grandparent, and hence parent
is also a sibling, it's not generally true that you can use the OCSP URL
from the parent to check the OCSP status of a child.
All of that is true (and is true for CRLs, I believe), but it is
At 6:51 PM -0800 1/5/09, Julien R Pierre - Sun Microsystems wrote:
Paul,
Paul Hoffman wrote:
3) A corollary of (2): Even when parent == grandparent, and hence parent
is also a sibling, it's not generally true that you can use the OCSP URL
from the parent to check the OCSP status of a child.
All
On Mon, Jan 5, 2009 at 8:14 PM, Paul Hoffman phoff...@proper.com wrote:
As far as I know, the AIA only applies to the end entity certificate, and not
to any children certificates. Do you have any evidence in any standard that
this is not the case ?
From RFC3280 :
4.2.2.1 Authority
9 matches
Mail list logo