[cabfpub] Intermediate certificate names

Jeremy Rowley jeremy.rowley at digicert.com
Tue Mar 10 15:35:30 MST 2015


To clarify, current Section 9.1.1 talks only about the issuer fields.  To support name chaining under RFC 5280, these fields must contain the same information as found in the subject of the issuing cert.  This is not clear in the language. 

-----Original Message-----
From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org] On Behalf Of Jeremy Rowley
Sent: Tuesday, March 10, 2015 4:24 PM
To: Geoff Keating
Cc: public at cabforum.org
Subject: Re: [cabfpub] Intermediate certificate names

That could be three different entities.  

However, we realized during the discussion that the section actually mixes two issues: 1) information in the subject of the issuing cert and 2) information in the issuer field of an end-entity cert. To clarify, we're going to need to separate out the two issues. 

-----Original Message-----
From: Geoff Keating [mailto:geoffk at apple.com] 
Sent: Tuesday, March 10, 2015 3:39 PM
To: Jeremy Rowley
Cc: Rob Stradling; Erwann Abalea; public at cabforum.org
Subject: Re: [cabfpub] Intermediate certificate names

I was speaking loosely.  The actual definition from the BRs is that the CA is "An organization that is responsible for the creation, issuance, revocation, and management of Certificates."

> On 10 Mar 2015, at 2:27 pm, Jeremy Rowley <jeremy.rowley at digicert.com> wrote:
> 
> Here's a realistic scenario that I think demonstrates a lot of the complication:
> 1) CA1 signs a cert for CA2 (cross-sign)
> 2) CA3 hosts the infrastructure for CA2 (hosting)
> 3) RA1 does all the validation and approves issuance of the cert.
> 
> What is the name of the intermediate and who controls the private key? 

So, in this case, the organization that is *responsible* is probably CA2.  They oversee RA1, they have a contract with CA3.  CA1 probably won't want to be responsible for CA2's operations.  CA3 will say "we're just hosting, we have no liability for anything".

You can do this backwards, by saying that the organization named in the certificate is the CA and therefore is responsible; so, the real question is, as the CA issuing the intermediate, who do you trust to be responsible?

> -----Original Message-----
> From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org] On Behalf Of Rob Stradling
> Sent: Tuesday, March 10, 2015 3:24 PM
> To: Geoff Keating; Erwann Abalea
> Cc: public at cabforum.org
> Subject: Re: [cabfpub] Intermediate certificate names
> 
> What does it actually mean to "hold" a private key?
> 
> http://www.merriam-webster.com/dictionary/holder says:
> "a person who holds or owns something"
> 
> If Bozo, Inc owns a private key but DigiCert controls it, who is the CA?

_______________________________________________
Public mailing list
Public at cabforum.org
https://cabforum.org/mailman/listinfo/public


More information about the Public mailing list