On Thu, Nov 26, 1998, S.T. Wong wrote:

> > The Subject of a certificate is the _owner_ of the certificate, i.e.  in
> > context of an SSL webserver the DN which described the server. The DN here is
> > usually something like
> 
> I see, but will someone check the subject (manually?) for the identity of the
> owner through LDAP ? 

Checked? Hmmm... no, usually one would use LDAP to just lookup the
certificates of the issuing CAs in the directory for the verification process.

> I just wonder if there will be problem when the 
> "identify" of an object found in LDAP and a certificate is different.  I 
> always get confused when talking about the "identity" of an object.  Maybe it's
> a bit off topic : Can I identify someone globally and uniquely ?  

No, the Subject-DN is not unique globally. It is most of the time unique per
CA, but actually there is no need for this.  Actually a CA can issue more than
one certificate to the same Subject-DN. That's why in X.509v3 some extensions
exists (one of them can be used for unique ids). AFAIK the only really unique
thing in a X.509 certificate is the pair <serial number, CA DN>. That's why
this pair is used for Certificate Revocation Lists (CRL).

> > /C=XY /ST=Snake Desert /L=Snake Town 
> > /O=Snake Oil, Ltd /OU=Webserver Team /CN=www.snakeoil.dom
>[...]
> > Sure. Apache+mod_ssl doesn't query your LDAP database...
> 
> In fact, we're in the process of set up LDAP and CA locally.  However, there's
> long discussion here about the DN definition.  Someone proposed the "dc" model
> - to have DN: uid=<unique id>, dc=cuhk, dc=edu, dc=hk, according to rfc2247,
> while someone suggested using the DN in a certificate (like those generated
> by SSLeay).  Currently our applications will check the RDN's in an entry, e.g.
> mail, while some applications (like Communicator) only checks certain attributes
> (e.g. mail) when talking to LDAP instead of using the DN.
> Although there's no immediate need for extracting information from certificate,
> it'll be a nightmare to change the DN after production. :(

Yes, but isn't there a mapping mechanism in LDAP to overcome those things? Can
the LDAP filter funtions be used for this? Hmmm...  my current LDAP knowledge
is too less here, sorry.
                                       Ralf S. Engelschall
                                       [EMAIL PROTECTED]
                                       www.engelschall.com
______________________________________________________________________
Apache Interface to SSLeay (mod_ssl)   www.engelschall.com/sw/mod_ssl/
Official Support Mailing List               [EMAIL PROTECTED]
Automated List Manager                       [EMAIL PROTECTED]

Reply via email to