No, that is the same link that is available from the DCDT page. As I said, when I open that URL, the connection is refused in both Chrom and Internet Explorer:"dcdt31prod.sitenv.org refused to connect."
--
You received this message because you are subscribed to a topic in the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/directtesttool/WHcZFA0zxw4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to directtesttool+unsubscribe@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/b0c2fcee-c291-431c-b03e-52945e7ed547%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Sandeep, you did pass the downloaded cert to them in the earlier mail, but they seem to be complaining about the “content” of the cert?
In which case, if it is valid, it would be a fix. But this has been around for some time, maybe it is a user error.
--
You received this message because you are subscribed to the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
directtesttoo...@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/7eed617f-57ad-4343-b78d-99f02655a4ec%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Disclaimer
The information contained in this communication from the sender is confidential. It is intended solely for use by the recipient and others authorized to receive it. If you are not the recipient, you are hereby notified that any disclosure, copying, distribution or taking action in relation of the contents of this information is strictly prohibited and may be unlawful.
This email has been scanned for viruses and malware, and may have been automatically archived by Mimecast Ltd, an innovator in Software as a Service (SaaS) for business. Providing a safer and more useful place for your human generated data. Specializing in; Security, archiving and compliance. To find out more Click Here.
In conforming CA certificates, the value of the subject key identifier MUST be the value placed in the key identifier field of the authority key identifier extension (Section 4.2.1.1) of certificates issued by the subject of this certificate.
We’ll look into the issue.
Thank you
From: directt...@googlegroups.com [mailto:directt...@googlegroups.com]
On Behalf Of jch...@athenahealth.com
Sent: Wednesday, March 08, 2017 10:47 AM
To: Direct Certificate Discovery Tool
Cc: sandeep...@gmail.com
Subject: Re: [DCDT Google Group] Re: DCDT 2015 trust anchor
Thanks, but that is once again the same anchor that I already received. Again, the problem is that the anchor has a Subject Key Identifier extension field that does not match the Authority Key Identifier field in the discovered certificates. The cryptography library we are using (and cannot modify) rejects the certificate as untrusted if the anchor has a Subject Key Identifier field present, and the issued certificate has an Authority Key Identifier present, and they don't match exactly. This is a pretty standard step for ensuring that the anchor did in fact issue the discovered certificate, and we have been happily exchanging Direct messages with other HISPs using this library for years now.
--
You received this message because you are subscribed to a topic in the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this topic, visit
https://groups.google.com/d/topic/directtesttool/WHcZFA0zxw4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to
directtesttoo...@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/d9b8a35f-c106-4071-9d30-641d2f08ea1b%40googlegroups.com.
We’ll look into the issue.
Thank you
From: directtesttool@googlegroups.com [mailto:directtesttool@googlegroups.com] On Behalf Of jch...@athenahealth.com
Sent: Wednesday, March 08, 2017 10:47 AM
To: Direct Certificate Discovery Tool
Cc: sandeep...@gmail.com
Subject: Re: [DCDT Google Group] Re: DCDT 2015 trust anchor
Thanks, but that is once again the same anchor that I already received. Again, the problem is that the anchor has a Subject Key Identifier extension field that does not match the Authority Key Identifier field in the discovered certificates. The cryptography library we are using (and cannot modify) rejects the certificate as untrusted if the anchor has a Subject Key Identifier field present, and the issued certificate has an Authority Key Identifier present, and they don't match exactly. This is a pretty standard step for ensuring that the anchor did in fact issue the discovered certificate, and we have been happily exchanging Direct messages with other HISPs using this library for years now.
The relevant sections of RFC5280 are 4.2.1.1 and 4.2.1.2. In particular from 4.2.1.2:
In conforming CA certificates, the value of the
subject key identifier MUST be the value placed in the key identifier
field of the authority key identifier extension (Section 4.2.1.1) of
certificates issued by the subject of this certificate.
--
You received this message because you are subscribed to a topic in the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/directtesttool/WHcZFA0zxw4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to directtesttool+unsubscribe@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/d9b8a35f-c106-4071-9d30-641d2f08ea1b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this group and stop receiving emails from it, send an email to directtesttool+unsubscribe@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/BN6PR09MB146005AD2D555D73DDF17D918D2E0%40BN6PR09MB1460.namprd09.prod.outlook.com.
Thank you for your response, just wanted to add that on digging deeper this field though a MUST match - is not part of the validation but only to assist in path building - as exemplified by the last line following to the excerpt from the RFC 4.2.1.2:.. viz..To facilitate certification path construction, this extension MUST appear in all conforming CA certificates, that is, all certificates including the basic constraints extension (Section 4.2.1.9) where the value of cA is TRUE. In conforming CA certificates, the value of the subject key identifier MUST be the value placed in the key identifier field of the authority key identifier extension (Section 4.2.1.1) of certificates issued by the subject of this certificate. Applications are not required to verify that key identifiers match when performing certification path validation.There are some discussions to this point in the internet, for instance hereHaving said that we shall address this issue and follow up - please let us know if the above information adds any further value.Thankssrini
On Wed, Mar 8, 2017 at 11:33 AM, OS - ONC SI&T Team <SIT...@hhs.gov> wrote:
We’ll look into the issue.
Thank you
From: directt...@googlegroups.com [mailto:directt...@googlegroups.com] On Behalf Of jch...@athenahealth.com
Sent: Wednesday, March 08, 2017 10:47 AM
To: Direct Certificate Discovery Tool
Cc: sandeep...@gmail.com
Subject: Re: [DCDT Google Group] Re: DCDT 2015 trust anchor
Thanks, but that is once again the same anchor that I already received. Again, the problem is that the anchor has a Subject Key Identifier extension field that does not match the Authority Key Identifier field in the discovered certificates. The cryptography library we are using (and cannot modify) rejects the certificate as untrusted if the anchor has a Subject Key Identifier field present, and the issued certificate has an Authority Key Identifier present, and they don't match exactly. This is a pretty standard step for ensuring that the anchor did in fact issue the discovered certificate, and we have been happily exchanging Direct messages with other HISPs using this library for years now.
The relevant sections of RFC5280 are 4.2.1.1 and 4.2.1.2. In particular from 4.2.1.2:
In conforming CA certificates, the value of the
subject key identifier MUST be the value placed in the key identifier
field of the authority key identifier extension (Section 4.2.1.1) of
certificates issued by the subject of this certificate.
--
You received this message because you are subscribed to a topic in the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/directtesttool/WHcZFA0zxw4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to directtestto...@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.
To view this discussion on the web visit https://groups.google.com/d/msgid/directtesttool/d9b8a35f-c106-4071-9d30-641d2f08ea1b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "Direct Certificate Discovery Tool" group.
To unsubscribe from this group and stop receiving emails from it, send an email to directtesttoo...@googlegroups.com.
Visit this group at https://groups.google.com/group/directtesttool.