Since I know the public key used to sign a message, I can generate a new certificate that has that public key. I just copy over the MIC and the message body intact and thats it...
And no validator should place any reliance on that rogue certificate unless it's signed with the private key of a CA whose public key can be resolved, through a trustworthy certification path, to a (P)CA whose public key the validator already holds. Caveat receptor. --jl
<Prev in Thread] | Current Thread | [Next in Thread> |
---|---|---|
|
Previous by Date: | Re: A small cloud with a golden lining?, solo |
---|---|
Next by Date: | Re: A small cloud with a golden lining, p . churchyard |
Previous by Thread: | Re: A small cloud with a golden lining?, solo |
Next by Thread: | Re: A small cloud with a golden lining?, Keith R. Ker |
Indexes: | [Date] [Thread] [Top] [All Lists] |