Jason Keltz wrote:
> Can someone explain why the server has to pass along the certificates from
> the CAs though?  I don't quite understand.  I'm new to this all.  Isn't it
> up to the server to send out just the certificate, and then up to the
> client to do the checks? 

On one side, it's because the TLS1 spec (haven't got an URL to the SSL3
drafts handy) says so. The self-signed certificate at the top level can
optionally be omitted though, since it will need to be explicitly
trusted (and thus, I presume, known) or the client-side verification
will fail.

On a more practical note, I think it is a very convenient thing to do,
given the fact that there's still, to my knowledge, no standardized way
for a given TLS client to be able to perform path discovery, meaning
that it won't necessarily be able to contruct a given chain on its own.

Even were it able to, it would conceivably run in to problems anyway due
to the "ship first, ask questions later" approach taken by a great deal
(kind of an understatement) of the PKIs I've come across so far. I can't
actually think of a single one that I've actually managed to verify
without hiccups, however minor, against the path validation algorithms
in either X.509 or RFC 2459. This might very well be a problem with me,
my diligence, or my memory though; in all fairness.

> I mean, isn't it counter-productive -- couldn't
> the server (be it imap or http) somehow send along fake CA certificates
> that make the real certificate look as if it were truly signed when it's
> not?

It would still need to compromise the private key of a certificate that
were trusted by the client in order to create a chain it would be able
to verify.

//oscar
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to