"Mark H. Wood" wrote:

> You don't have to, but you may decide that it's much better than the
> alternatives.  You could create your own certificate, but you need to
> answer two questions first:
> 
> o       How will my users acquire copies of my certificate?

Huh?  The certificate is presented as part of the SSL handshake.

> o       Why should they trust that certificate, or that delivery
>         mechanism?

If it's a closed system,  you may instruct users to click on a link
that presents the root cert with MIME type "application/x-x509-ca-cert"
and provide instructions on how to answer the ensuing dialog boxes.

> Think about it for a moment.  If a total stranger walked up to you and
> said, "I represent a bank.  Give me all your money and I'll open an
> account for you," you'd laugh and walk away.  If your longtime friend,
> known to be working for a bank, said, "Jenny here is our new accounts
> manager; give her all your money and she'll open an account for you", you
> might well trust him (and her) even though it's not quite what you're used
> to.

You present a web of trust model which is somewhat misleading -- a web
site may present a cert which your browser trusts because it's signed
by VeriSign -- this doesn't mean that www.blah.net is really not in the
business of ripping of credit card presenters.  Authentication is not
authorization.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to