21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

had three different valid root certificates for their “class 3” PKI, which was generally for<br />

server certificates. One of those has now expired, and another one will expire in 2004.<br />

Here we detail only a subset of certificates that are distributed with Internet Explorer<br />

for Windows. Certificates in this list may expire, in which case you should go<br />

directly to the CA or to some other trusted source. At the time of writing, any valid<br />

certificate signed by one of the CAs listed in Table 10-1 is likely to be signed by one<br />

of the associated certificates.<br />

Usually, you should not simply trust all root certificates. For example,<br />

email certificates (class 1) do not really offer a guarantee about who is<br />

on the other end. In addition, you will want to validate other information<br />

about certificates, even if the CA’s signature is valid (see Recipes<br />

10.4 through 10.7).<br />

The “use” column in the table indicates the kind of certificate the root CA certificate<br />

uses to sign. Generally, certificates are intended for one of the following purposes:<br />

Secure email<br />

The CA is rarely validating anything other than the fact that the person with the<br />

private key associated with the certificate has access to the email address listed in<br />

the certificate. Such certificates are used in the S/MIME secure email standard.<br />

Client authentication<br />

The CA (or its subordinate) has done reasonable validation on the identity of the<br />

entity to which the certificate is issued.<br />

Server authentication<br />

Used primarily for electronic commerce over the Web. The CA or its subordinate<br />

has done validation on the identity of the entity to which the certificate is<br />

issued.<br />

Code signing<br />

Used for validating the vendor that produced mobile code. The CA or its subordinate<br />

has done validation on the identity of the entity to which the certificate is<br />

issued.<br />

Time stamping<br />

Used for proving the existence of data at a specific date and time.<br />

Table 10-1. CA certificates, their uses, expiration dates, and fingerprints<br />

CA Certificate Use<br />

Equifax Secure Certificate<br />

Authority<br />

520 | Chapter 10: Public Key Infrastructure<br />

Secure email, server authentication,<br />

code signing<br />

Equifax Secure eBusiness CA-1 Secure email, server authentication,<br />

code signing<br />

Expires<br />

(GMT) MD5 fingerprint<br />

2018-08-22<br />

16:41:51<br />

2020-06-21<br />

04:00:00<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

67:CB:9D:C0:13:24:8A:82:9B:<br />

B2:17:1E:D1:1B:EC:D4<br />

64:9C:EF:2E:44:FC:C6:8F:52:<br />

07:D0:51:73:8F:CB:3D

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!