21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 10-1. CA certificates, their uses, expiration dates, and fingerprints (continued)<br />

CA Certificate Use<br />

VeriSign Class 2 Public PCA (2nd Generation)<br />

VeriSign Class 2 Public PCA (2nd Generation)<br />

See Also<br />

• Root Report from the PKI Laboratory: http://www.pkiclue.com/<br />

• Recipes 10.4, 10.5, 10.6, 10.7<br />

10.4 Understanding X.509 Certificate<br />

Verification Methodology<br />

<strong>Problem</strong><br />

You have an X.509 certificate, and you want to determine whether the certificate<br />

should be considered “valid.” While the requirements defining validity may be different<br />

from application to application, you will be interested in knowing whether the<br />

identity bound to that certificate ought to be trusted.<br />

Solution<br />

First, establish a trusted path from the certificate to an installed root certificate.<br />

Then, if you have a trusted path, use information in the certificate to determine the<br />

522 | Chapter 10: Public Key Infrastructure<br />

Secure email, client authentication,<br />

code signing<br />

Secure email, client authentication,<br />

code signing<br />

VeriSign Class 3 Public PCA Secure email, client authentication,<br />

code signing, server<br />

authentication<br />

VeriSign Class 3 Public PCA Secure email, client authentication,<br />

code signing, server<br />

authentication<br />

VeriSign Class 3 Public PCA (2 nd<br />

Generation)<br />

VeriSign Class 3 Public PCA (2 nd<br />

Generation)<br />

VeriSign Commercial Software<br />

Publishers<br />

VeriSign Individual Software<br />

Publishers<br />

Secure email, client authentication,<br />

code signing, server<br />

authentication<br />

Secure email, client authentication,<br />

code signing, server<br />

authentication<br />

2018-05-18<br />

23:59:59<br />

2028-08-01<br />

23:59:59<br />

2004-01-07<br />

23:59:59<br />

2028-08-01<br />

23:59:59<br />

2018-05-18<br />

23:59:59<br />

2028-08-01<br />

23:59:59<br />

Secure email, code signing 2004-01-07<br />

23:59:59<br />

Secure email, code signing 2004-01-07<br />

23:59:59<br />

Expires<br />

(GMT) MD5 fingerprint<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.<br />

74:A8:2C:81:43:2B:35:60:9B:<br />

78:05:6B:58:F3:65:82<br />

2D:BB:E5:25:D3:D1:65:82:3A:<br />

B7:0E:FA:E6:EB:E2:E1<br />

78:2A:02:DF:DB:2E:14:D5:A7:<br />

5F:0A:DF:B6:8E:9C:5D<br />

10:FC:63:5D:F6:26:3E:0D:F3:<br />

25:BE:5F:79:CD:67:67<br />

C4:63:AB:44:20:1C:36:E4:37:<br />

C0:5F:27:9D:0F:6F:6E<br />

A2:33:9B:4C:74:78:73:D4:6C:<br />

E7:C1:F3:8D:CB:5C:E9<br />

DD:75:3F:56:BF:BB:C5:A1:7A:<br />

15:53:C6:90:F9:FB:CC<br />

71:1F:0E:21:E7:AA:EA:32:3A:<br />

66:23:D3:AB:50:D6:69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!