Ian G wrote:
So if one wanted to "follow the standard" one could
create two keys, Alice and Bob, and have Alice
sign Bob's PK.  Bob then becomes the root and is
used to sign all lower level public keys.  Alice is
the trust anchor.

Then, store Alice and Bob together, and if they ever
get compromised, have Alice sign Bob's revocation.

Yes, if you apply the standard, there is no need to check the trust anchor for being a valid CA.

Which helps to trust the old Verisign X509 V1 root CA that have no element at all inside that says they can be trusted as CA, no basic constraint, no key usage.
_______________________________________________
Mozilla-security mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-security

Reply via email to