Thanks all for the information.  This is good stuff to know too.  What
I was really trying to understand is the nuts-n-bolts mechanics of how
a legit CA certificate differs from a self-created one (I know, this
is a dumb question...)

For example, I can create my own for test purposes this way:

openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt

However, if I turn on cert verfication in my programs, this one gets
rejects straight away (unknown CA).

I presume the reason is because I have generated my own key to produce
this cert.

Is it possible to create a CA cert that looks and feels like a root
cert issued from a legit company, like Verisign etc?  I just want it
to work in a test environment to ensure that cert verification works
for both client and server certificates.

Thanks again for your patience,

Dallas

On Sat, May 29, 2010 at 4:02 AM, Konrads Smelkovs <konr...@smelkovs.com> wrote:
> As somebody who audits CAs for purpose of them getting into trusted root
> list, this is what you have to do:
> a) Obtain WebTrust for certification authorities or ETSI 101 456 standard (+
> EV guidelines from cabforum.org)
> b) Implement systems in line with one of these standards. Not cheap. HSM
> devices alone cost $10k & upwards.
> c) Get somebody who is trustworthy (think accountants or one of Big 4
> auditor companies, i recommend KPMG as I work for them) and/or webtrust
> accredited auditors (who can certify) to audit you. First time you will
> almost fail, but if the auditor is an advisor, he'll help you through. Not a
> cheap thing to do either.
> d) Submit your application to microsoft trusted root list program, mozilla,
> opera and everybody else. MS has deadlines on march and september for
> submission
> e) Every  12 months, repeat audit.
> f) Ask yourself, do you really need it and get maybe some CA to cross sign
> you.
>
> --
> Konrads Smelkovs
> Applied IT sorcery.
>
>
> On Sat, May 29, 2010 at 5:08 AM, Patrick Patterson <ppatter...@carillon.ca>
> wrote:
>>
>> On 28-May-10, at 8:04 PM, Dallas Clement wrote:
>>
>>> This is probably a dumb question, but if I wanted to be come the next
>>> Verisign of this world, how do I create a legitimate CA cert?  I'd
>>> like to be able to create my own that passes verification without
>>> throwing errors, like "unknown CA".
>>>
>> Well, the first thing that you do, is do things that build "Trust", or the
>> perception that you are trustworthy. Invest in hardware that will protect
>> the CA's keys. Build processes that protect those keys. Use facilities that
>> give the impression of trust (if you've ever been to Verisign HQ for a key
>> ceremony, you'll appreciate the amount of "theater" that they do :). Then,
>> document all of these in your "Certificate Policy" and Certification
>> Practice Statement, along with all of the ways that you go about binding
>> people or servers to their associated keys, and how you manage all of your
>> personnel and facilities that are used in the operation of the CA, and
>> issuance of certificates by that CA. When you cut your keys, do it in the
>> presence of an auditor, and according to a proper key ceremony script.
>>
>> Once you have this, then get audited to prove that you are following your
>> certificate policy. Most of the browser vendors, to be included in their
>> "Trusted Roots" list, like to see a Webtrust audit. If you want to be
>> included in the list that can validate EVSSL certs, then you have to also
>> follow the guidelines of the CA/Browser forum.
>>
>> Most of the vendors, however, also have the caveat that in order to be
>> included in their list, you have to be a commercial entity that are issuing
>> certs to "John Q Public". If you only issue to people within a small, closed
>> community, then you'll have to talk pretty fast to get them to accept your
>> CA into their browser.
>>
>> That's it. If you need any help, give us a call :)
>>
>> ---
>> Patrick Patterson
>> President and Chief PKI Architect
>> Carillon Information Security Inc.
>> http://www.carillon.ca
>>
>>
>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-us...@openssl.org
>> Automated List Manager                           majord...@openssl.org
>
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to