I’m considering setting up a hub and spoke PKI deployment, with the central 
certificate trusted with all clients.  I would then use policies and name 
constraints to limit the use to S/MIME and name constraints to enforce the 
delegation of the subject name / SAN name.

I’ve read that name constraints aren’t reliable on the client side, and would 
therefore make this effort worthless.

Does the Bouncy Castle client code verify name constraints when checking the 
PKI trust for a given certificate?  (in my case S/MIME)

PS- Any anicdotal information is appreciated regarding name constraints and 
qualified subordination.
http://technet.microsoft.com/en-us/library/cc785267(v=ws.10).aspx

**********************************************************************
This e-mail may contain information that is privileged, confidential or 
protected under state or federal law. If you are not an intended recipient of 
this email, please delete it, notify the sender immediately, and do not copy, 
use or disseminate any information in the e-mail. Pursuant to IRS Circular 230, 
any tax advice in this email may not be used to avoid any penalties imposed 
under U.S. tax laws. E-mail sent to or from this e-mail address may be 
monitored, reviewed and archived.

Reply via email to