Correction: even with Client certificate authentication, there is no 
distribution of any private key to clients; only a client certificate signed 
with a private key held at the server end.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Thursday, August 22, 2019 8:06 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: vendor distributes their private key

Joel, it's just plain wrong. Others have listed the specifics. It just plain 
shows they have no clue how certificates work. It would be like if you 
installed a nice lock on your front door, and then hung the key on a hook 
outside next to it. 

You might ask what part of *private* key they are having trouble understanding.

Client authentication -- where appropriate -- is goodness. But client 
authentication requires a separate key for each client (more or less). A client 
certificate and key "proves" you are the appropriate client. If the key is 
widely distributed then anyone can "prove" they are you. Client certificates 
are analogous to passwords. Making the key public would be like making 
passwords public.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Joel M Ivey
Sent: Thursday, August 22, 2019 5:57 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: vendor distributes their private key

A vendor has an ftps server for us to connect to from a batch job on zos.  
Similar setups with vendors have required the vendor to provide their server's 
public cert chain for import into RACF.   This vendor insists on providing not 
just their server public cert chain but also their private key.  

First, they provided a password-protected p12 file, describing it as containing 
the "root, intermediate, and private certs".  I requested their public 
certificate chain only, they sent me a DER file -- with both the server cert 
and its private key.  I have asked them to elaborate on their need to 
distribute their private key to me, their response has essentially been, that's 
the way we do it. 

I'm not comfortable accepting anyone's private key.   There has been no mention 
of "client authentication", and I'm still not sure I'd be comfortable with that 
config, either. 

Help me understand two things: 1) what I'm missing as to why any vendor would 
require me to install their private key on my side when installing the public 
cert on my side should suffice as in many other instances, and 2) arguments 
for/against client authentication (not password authentication, but client) in 
case that is why they're sending me their private key.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to