Ben Laurie <[EMAIL PROTECTED]>:
> Salz, Rich wrote:
>>> Suppose of certs A,B,C, that C signs
>>> B and B signs A. A is the final cert and lists B as issuer, so B
>>> must sign A. But B might also be signed by D. So either of the
>>> chains C,B,A or D,B,A would be valid. This can only work if the
>>> issuer specifies a public key rather than a whole issuer cert.
>>> I don't know for sure that x509 actually works that way.
>> You're correct. In particular, when D signs B and B signs D this is called
>> cross-certification, and is explained (sorta) in the PKIX documents.
>>
>> There are those who like it, and those who loathe it. I'm in the latter
>> camp. :)
> But doesn't this just mean I should serve A,B,C and D? Or can't I do
> that?
Not according to RFC 2246, section 7.4.2:
certificate_list
This is a sequence (chain) of X.509v3 certificates. The sender's
certificate must come first in the list. Each following
certificate must directly certify the one preceding it. Because
[...]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]