To:
ietf-provreg@cafax.se
From:
Hugo Koji Kobayashi <koji@registro.br>
Date:
Tue, 5 Dec 2006 15:58:38 -0200
Content-Disposition:
inline
In-Reply-To:
<046F43A8D79C794FA4733814869CDF07019A6F68@dul1wnexmb01.vcorp.ad.vrsn.com>
Sender:
owner-ietf-provreg@cafax.se
User-Agent:
Mutt/1.4.2.1i
Subject:
Re: [ietf-provreg] Certificate Validation and Subject Analysis
Scott, Our (.br Registry) server implementation uses the Subject's Common Name to carry an unique client identifier that is used to authenticate clients in a multiple match authentication (EPP <clID> and <pw>, IP address, and certificate). Hugo On Tue, Dec 05, 2006 at 08:13:29AM -0500, Hollenbeck, Scott wrote: > I received a question from an IESG member about EPP implementations and > X.509 digital certificate validation. What are implementers doing with > the certificate subject name information when validating the > certification path of a client or server? Is the name being examined > and/or used for authentication or access control purposes? > > -Scott- >