Richard Levitte - VMS Whacker wrote:
> 
> From: Kent Crispin <[EMAIL PROTECTED]>
> 
> kent> Just thinking out loud...
> kent>
> kent> Note that the PGP "web of trust" model works without a centralized CA,
> kent> and that free key servers exist.  Perhaps there is some hybrid possible,
> kent> where people can register for free/low cost, and can also register as
> kent> independent CAs.  By gaining endorsements from other registrants,
> kent> gradually build up a hierarchy of signers that are considered extremely
> kent> trustworthy -- these highly endorsed signers would effectively be mini
> kent> CAs, with high reputation in the community...*why* they are considered
> kent> trustworthy wouldn't need to be addressed, and they could market their
> kent> trustworthiness however they thought best...
> 
> And there we have the difference in philosophy between the two systems
> in a nutshell.
> 
> What you say is a nice thought, and I'd very much like to see
> something like that, but I see one problem with it, at least with the
> current definition of RFC2459 certificates (as I understand RFC2459.
> If I'm way wrong, please tell me): there can only be one signature for
> each certificate.
> 

Well I suppose in the case of a certificate yes this isn't easily
achievable in a direct way.

It would be possible to have an end user have a self signed certificate
and then include the various people who "trust" it carried around as a
separate entity which might be included in things like S/MIME
attributes. Making this part of the certificate itself is trickier but
it could be done with a few tricks.

> 
> In any case, there are already institutions that we (or at least,
> that's how it works in Sweden) give a certain amount of trust to hold
> the ultimate proof of our identity (in Sweden, it's the IRS, of all
> things).  It would be quite natural for those to start handing out
> certificates.  I think this has already started, or at least that the
> fuondation for such a thing are being layed out, but I'm sure there
> will be one or another trivia master who will correct me on this :-).
> 

There's always a danger with the "trusted CA" model. Anyone who can
coerce a trusted CA into issuing a bogus certificate can perform a man
in the middle attack and undermine the security.

The coercer might vary from a criminal to a government agency which some
would argue is the same thing :-)

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to