[cabfpub] Intermediate certificate names

Richard Wang richard at wosign.com
Tue Mar 10 22:35:40 UTC 2015


+1

-----Original Message-----
From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org] On
Behalf Of Jeremy Rowley
Sent: Tuesday, March 10, 2015 3:36 PM
To: Jeremy Rowley; Geoff Keating
Cc: public at cabforum.org
Subject: Re: [cabfpub] Intermediate certificate names

To clarify, current Section 9.1.1 talks only about the issuer fields.  To
support name chaining under RFC 5280, these fields must contain the same
information as found in the subject of the issuing cert.  This is not clear
in the language. 

-----Original Message-----
From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org] On
Behalf Of Jeremy Rowley
Sent: Tuesday, March 10, 2015 4:24 PM
To: Geoff Keating
Cc: public at cabforum.org
Subject: Re: [cabfpub] Intermediate certificate names

That could be three different entities.  

However, we realized during the discussion that the section actually mixes
two issues: 1) information in the subject of the issuing cert and 2)
information in the issuer field of an end-entity cert. To clarify, we're
going to need to separate out the two issues. 

-----Original Message-----
From: Geoff Keating [mailto:geoffk at apple.com] 
Sent: Tuesday, March 10, 2015 3:39 PM
To: Jeremy Rowley
Cc: Rob Stradling; Erwann Abalea; public at cabforum.org
Subject: Re: [cabfpub] Intermediate certificate names

I was speaking loosely.  The actual definition from the BRs is that the CA
is "An organization that is responsible for the creation, issuance,
revocation, and management of Certificates."

> On 10 Mar 2015, at 2:27 pm, Jeremy Rowley <jeremy.rowley at digicert.com>
wrote:
> 
> Here's a realistic scenario that I think demonstrates a lot of the
complication:
> 1) CA1 signs a cert for CA2 (cross-sign)
> 2) CA3 hosts the infrastructure for CA2 (hosting)
> 3) RA1 does all the validation and approves issuance of the cert.
> 
> What is the name of the intermediate and who controls the private key? 

So, in this case, the organization that is *responsible* is probably CA2.
They oversee RA1, they have a contract with CA3.  CA1 probably won't want to
be responsible for CA2's operations.  CA3 will say "we're just hosting, we
have no liability for anything".

You can do this backwards, by saying that the organization named in the
certificate is the CA and therefore is responsible; so, the real question
is, as the CA issuing the intermediate, who do you trust to be responsible?

> -----Original Message-----
> From: public-bounces at cabforum.org [mailto:public-bounces at cabforum.org] On
Behalf Of Rob Stradling
> Sent: Tuesday, March 10, 2015 3:24 PM
> To: Geoff Keating; Erwann Abalea
> Cc: public at cabforum.org
> Subject: Re: [cabfpub] Intermediate certificate names
> 
> What does it actually mean to "hold" a private key?
> 
> http://www.merriam-webster.com/dictionary/holder says:
> "a person who holds or owns something"
> 
> If Bozo, Inc owns a private key but DigiCert controls it, who is the CA?

_______________________________________________
Public mailing list
Public at cabforum.org
https://cabforum.org/mailman/listinfo/public
_______________________________________________
Public mailing list
Public at cabforum.org
https://cabforum.org/mailman/listinfo/public
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5099 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/public/attachments/20150310/04157586/attachment-0001.p7s>


More information about the Public mailing list