To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
-
-
Basically. Trust settings are stored on the PCCERT_CONTEXT associated with the HCERTSTORE it came from (as PROP_IDs plus the source of the store they came from). Standard practice for chain building (not just win) is for supplied certs, to replace with the trust anchor you have
-
You do sig verification of each node first (using supplied), then you try to swap supplied with any trust anchors you have. Also, Microsoft has really weird-ass behaviour with AKIs/SKIs that let you bypass the name checks and just be sig checks. See https://social.technet.microsoft.com/wiki/contents/articles/4954.windows-xp-certificate-status-and-revocation-checking.aspx …
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.