--
null - Spreading the right Information
null Mailing list charter: http://null.co.in/section/about/null_list_charter/
This list is supported by Institute of information security http://iisecurity.in
Join our Penetration Testing/Training team at NII/IIS (jo...@niiconsulting.com, jo...@iisecurity.in)
--
The problem with the certificate is written on the page
portal2.passportindia.gov.in uses an invalid security certificate.
The certificate is not trusted because the issuer certificate is unknown.
(Error code: sec_error_unknown_issuer)
This is because the certificate is self signed by TCS. And TCS is
providing this services
http://www.google.co.in/search?q=tcs+passport+seva
-
TAS
http://twitter.com/p0wnsauc3
On 06-Mar-2011, at 12:56 PM, TAS wrote:
> It has nothing to do with the browser not being update. And the
> behavior is not going to change even if you try an alternate browser.
> And any browser though understands a SSL certificate, it will throw
> you a warning if it is not issued by CA, Verisign, Thawte etc (Only
> licensed certificate issuing authorities)
Can you explain little more about 'Only licensed certificate issuing authorities'?
AFAIK, Tata Certifiying Authority is approved CA by GoI. IMO, one should not see such warning.
> The problem with the certificate is written on the page
>
> portal2.passportindia.gov.in uses an invalid security certificate.
> The certificate is not trusted because the issuer certificate is unknown.
> (Error code: sec_error_unknown_issuer)
>
> This is because the certificate is self signed by TCS. And TCS is
> providing this services
> http://www.google.co.in/search?q=tcs+passport+seva
Aren't all certificates self signed by the CA? Or am I missing something?
>Can you explain little more about 'Only licensed certificate issuing authorities'?
>AFAIK, Tata Certifiying Authority is approved CA by GoI. IMO, one should not see such warning.
For a proper SSL certificate check the Verified by and check the
verified by of certificate below
https://portal2.passportindia.gov.in/
TCS CA are only vendors for selling certificates issued by CA.
http://www.tcs-ca.tcs.co.in/index.jsp?rightHtml=includeJSP/chainDownload_current.jsp&leftTitle=CA%20Certificates&right1stTitle=Current%20Certificates&right2ndTitle=CA%20Certificates&highlight=0
> Aren't all certificates self signed by the CA? Or am I missing something?
They are self signed by CA. CA is an authority and when you generate
one you are not. At least I would not trust one if I am doing
something sensitive.
<--snipped from http://en.wikipedia.org/wiki/Certificate_authority
A CA issues digital certificates that contain a public key and the
identity of the owner. The matching private key is not similarly made
available publicly. (when you generate a self signed certificate both
the keys are with you. Not sure how credible the cert will be) A CA's
obligation in such schemes is to verify an applicant's credentials, so
that users and relying parties can trust the information in the CA's
certificates. CAs use a variety of standards and tests to do so. In
essence, the Certificate Authority is responsible for saying "yes,
this person is who they say they are, and we, the CA, verify that".
And may be you should also read.
http://en.wikipedia.org/wiki/Self-signed_certificate
-
TAS
http://twitter.com/p0wnsauc3
2011/3/6 शंतनू <shan...@gmail.com>:
> --
> null - Spreading the right Information
> null Mailing list charter: http://null.co.in/section/about/null_list_charter/
>
> This list is supported by Institute of Information Security http://iisecurity.in
> Real-world hackers, real-world training – Certified Professional Hacker at IIS
>