If I have a self-signed CA certificate in my truststore, and I am sent a chain of certificates where the root CA is missing, is this a problem and if so why? Say that the last certificate in the chain is called S and is signed by CA.
If the issuer for S is the same as the subject and issuer for the CA-cert in my truststore, and the public key from the truststore document can be used to verify the signature in S, would this be equivalent to including the self-signed CA cert in the chain?
More: I can imagine the CA having the same public key for two different private keys (but I don't see why they'd do that purposely). This would mean that some fields, in the self-signed cert with the private key that encrypted S's hash, could be different from the fields in our truststore cert, but the same public key could be used for both. If that is the case, couldn't the entity that sent me the chain just include my truststore certificate at the top, in order to deceive me? So I don't see why including a root certificate in the chain would make a difference in terms of trustworthiness, in that case either.