You'd also need to identify that second CA.  Verifying that internal 
(second) signature would be tricky since you'd have to remove the 
extension (tweak the DER length fields, etc) before hashing.  And then 
there's all the complexity of checking for revocation from the second CA. 
(Which, frankly, probably wouldn't happen given how little revocation 
checking is done on the "real" CA. :)  For example, wouldn't you have to 
keep the serial numbers in sync?  And validity periods?

A simpler approach seems to be for concerned applications to require the 
client to provide certificates from both CA's.

        /r$

--
SOA Appliances
Application Integration Middleware

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to