X.509, SSL & security of decentalized certification (RE: RSA getting rid of trusted third parties?)

Eric Rescorla ekr at rtfm.com
Mon Jun 24 12:48:37 EDT 2002


"Amir Herzberg" <inbox at amir.herzberg.name> writes:
> Ian Clelland said, 
> This is not as simple as one may expect. X.509 has a hierarchy mechanism
> designed for allowing organizations issue (or at least control)
> certificates of departments and employees - the Distinguished Name (DN)
> and its keywords. However, browsers normally identify the server by its
> DNS name, which is usually included in the dNSName attribute in the
> subjectAltName extension, rather than in the X.509 DN.
We could only hope :( It should be in the dNSName but actually,
it's usually stuffed into the Common Name, unless things have changed.

> Anyway, the validation is up to the browser - it is _not_ part of the
> SSL/TLS functionality. Furthermore, while X.509 and PKIX have mechanisms
> to allow a root CA to restrict the scope of certificates issued by a
> root CA, these mechanisms seem to focus on restricting the distinguished
> names in the issued certificates, rather than the subjectAltName (and in
> particular the DNS name). So my bet is that all or most browsers will
> not reject certificates with arbitrary DNS names issues by a corporation
> with a CA certified by RSA (or any other root CA). 
As far as I know, this is completely the case.

-Ekr

-- 
[Eric Rescorla                                   ekr at rtfm.com]
                http://www.rtfm.com/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list