While holding a lecture on PKI today, I was presented with a rather
interesting question that I couldn't answer:

A company wants to set up a web server that is secured through SSL,
and would like it to have maximum availability to the public out there
while keeping maximum trust within the company.  The way they tried to
solve this was to have the server return two server certificates, one
signed by VeriSign, which would be used by "the public out there" and
one that's signed by the internal company CA.

Of course, this fails, since the server will only use one server
certificate and one private key for it's communication.

So, my idea was that the company could create a local copy of the
VeriSign CA certificate, but signed by the internal company CA instead
of the next level VeriSign CA.  This means that the server certificate
signed by VeriSign could be used, and the certification path would
differ depending on your trust point (inside the company, the trust
point is the internal company CA, outside it would be VeriSign).  In
that copy of VeriSign CA cert, one could add all kinds of constraints
so it could only be used to certify the intended web server's server
certificate.

However, that idea has a problem: the company in question doesn't
trust VeriSign.  Period.  This means that it's potentially possible
that someone grabs VeriSigns CA private keys, creates a new server
certificate for the server in question, sets up a different server
that uses this new server certificate and spoofs DNS to get the web
server name redirected to themselves instead of the original machine.

So, my solution has flaws...

The only real solution we found so far was to have the server
available on ports 443 (for the public out there) and 444 (for access
from inside the company), and have those two ports return the
corresponding server certificate (443 would return the certificate
signed by VeriSign, 444 would return the certificate signed by the
internal company CA).

Any other ideas?  Solving this in a better way than having two ports
would be quite welcome.

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to