Andrew Cooke wrote:

> My comment is an observation, rather than an argument for changing:  You
> are imposing a security model on users that a malicious party can
> circumvent by changing the code.  This isn't really acceptable as part
> of a library (which may be assembled by others for a variety of security
> models), but then this is code in the apps directory, rather than in the
> library itself.
> 
> In other words, I understand your argument, but if this was part of the
> SSL library I would argue that it is up to people using the library to
> put this kind of check in.  But your code is in the ca utility rather
> than the library.
> 
> If people want to use the utility routines as a "library" to build their
> own CA scripts, then it would be better, for example, to provide a
> separate routine that checks that they know the CA password.  In that
> way the person writing the script has the choice of following your
> security model, or not.
> 
> As I said, I am not arguing either way - I can see why you have done
> this, but I hope I have also explained why people who are using the apps
> as a library to use in their own scripts may object.
> 
> Andrew

Sincerely I do not uderstand your observation: to issue a CRL you have to
load the CA secret Key (either using library routines) and if it has been
encrypted, you have to call for a "challenge" to get it (and providing the
encryption password). So if you don't know the protection password of the
CA key you can not issued CRLs ...

I don't know if I got your point, I hope so.

C' you,

        Massimiliano Pala ([EMAIL PROTECTED])
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to