Hodie post. Id. Mar. MMVI est, Kyle Hamilton scripsit:
> ...except that it's not.
> 
> A later certificate (w/ different public key) with the same CN can
> issue revocations against an earlier certificate with the same CN, per
> X.509.  That's part of the problem with the entire X.509 model in the
> first place.

There's no problem with the X.509 model.

You're right that a certificate signed by a CA can be revoked by
another CA which has the same exact DN (not CN). The reason is simple:
the X.509 standard states that a CA is designated by its name, not by
its certificate (or public key). That has 2 advantages:
 - a CA can have different keys for certificate signing and CRL
   signing,
 - a CA can be renewed without invalidating all the previous
   certificates, and still take them under its "control".

But what you're trying to say (that Mr Bad could create a certificate
with the same DN as a valid CA, and revoke certs emitted by this CA
without other intervention) is simply false. You *must* tell the
software to trust this certificate, there's no way for this to be
automatic (except in the SET scheme, but that's not the point here).

> On 3/15/06, David Schwartz <[EMAIL PROTECTED]> wrote:
> >
> >
> > > So if what you are saying is true then i could call
> > > myself the same name as a trusted CA authority when
> > > making my root CA and the browser will think i am a
> > > trusted CA. Is that correct?.  It seems too simple to be true.....
> >
> >         No. CAs are not identified by name but by key. That's the whole 
> > purpose of
> > a certificate -- to associate a name with a particular key.

-- 
Erwann ABALEA <[EMAIL PROTECTED]>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to