On 04/02/2012 03:54 PM, Russ Allbery wrote:
> You definitely want class 0 and class 2 certs hashed into the same
> directory under nearly all circumstances that don't involve being very
> paranoid about the CAs that you accept, since that allows the OpenSSL
> CAdir directive to work properly and is WAY easier to maintain.

I'm not convinced that you want class 2 mixed with class 0 in most
cases.  Class 2 certs are used for authentication of your own services;

A web server might authenticate clients via your organization's private
CA, for example, while serving your own certificate that is certified by
a member of the standard cartel to avoid "errors" in common browsers.

In this case, mixing class 0 and class 2 would be a serious mistake
(because the web server would then accept client certificates issued by
the public authority).

> It is often nice to have class 1 certs in the same location for the same
> reason, although not quite as important.

Class 1 certs almost certainly do not belong in this category, since
they are generally not intended for use as a certificate authority.

The X.509 conceptual framework is pretty confusing already, and
encouraging admins to conflate service certificates with CA
certificates.  It seems like a bad idea to me to mix them.

Consider also the case of the depleted OpenSSL PRNG seed from 2008 -- if
the local machine's key was one of the vulnerable ones, and it was
trusted as a legitimate authority by being placed in this list, then
both sides of a mutually-authenticated connection could be MITMed.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to