Erwann ABALEA wrote:
> 
> SET certificates are X.509v3 certificates at first.
> 
> They have some critical and non-critical extensions specifying the type of
> cert it is, which level, for which usage (you can have a certificate for
> cert signing, another one for CRL signing, a third for tunneling, and
> a fourth for digital signature, all four with the same name).
> 
> Basically, all the following extensions should be present in the BCA
> (Brand CA), GCA (Geopolitical CA), MCA (Merchant CA), PCA (Payment Gateway
> CA), and CCA (Cardholder CA):
>   X509v3 Authority Key Identifier:
>       DirName:/C=US/O=SET Test Root
>       serial:0A:FE:07:21:6F:EA:BC:A8:9B:F3:4B:52:6F:D1:AE:38
>       (* no keyid *)
>   X509v3 Key Usage: critical
>       Certificate Sign, CRL Sign (* you can combine the 2 usages *)
>   X509v3 Private Key Usage Period:
>       Not Before: Nov  7 15:36:00 2000 GMT, Not After: Nov  6 23:59:59 2001 GMT
>       (* the maximum is one year, for every level *)
>   X509v3 Certificate Policies: critical
>       Policy: 2.23.42.5.0
>          Unknown Qualifier: 2.23.42.7.6
>       (* every level {RCA, BCA, GCA, {MCA, PCA, CCA}} can add it's one
>          Policy *)
>   X509v3 Basic Constraints: critical
>       CA:TRUE, pathlen:2
>       (* 3 for RCA, 2 for BCA, 1 for GCA, 0 for {MCA, PCA, CCA} *)
>   2.23.42.7.1: critical (* this one is the X509v3 Certificate Type *)
>       .... (* something among RCA, BCA, GCA, PCA, MCA, CCA, Merchant,
>               PGWY, or Cardholder *)
> 
> There's another extension that is specific for the RCA (Root
> CA) certificates, and it's the "X509v3 Hashed Root Key", which contains a
> hash of the next root public key.
> Unfortunately, this extension cannot be parsed by OpenSSL right now (I
> went into this problem some months ago, posted a question, and didn't
> receive a valuable answer), as the OID is "2.23.42.7.0", and the leading
> ".0" causes problems (try to add it into the objects.h and rebuild the
> obj-dat.h, and you'll see).
> 
> There are some other extensions specific for PCA certificates, some other
> for Merchant Certificates.
> 
> I can send good (working) SET certificates to the OpenSSL team (if you're
> interested), these are signed by a Test Root that we host at Certplus, and
> these certificates are used for our test SET system. I can also send
> production certificates (we host some CAs), since certificates are
> public objects. The SET certificates that were present in the SSLeay
> package are invalid ones.
> 

Yes I wouldn't mind looking at some SET certificates. If only to see if
the OID problem is still there. Some things were fixed a while ago but I
haven't checked to see if trailing zeroes work.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to