Joel wrote:

>Sorry, I wasn't clear in my question. (I'm confused, I know.)
>
>(And thanks for trying to help a confused newb. ;-)
>[...]
>  
>
>What I'm trying to ask, if I can get it right this time, is whether a
>root CA will be passing its own self-signed certificate out. 
>  
>
Ahh, now I think we get nearer to the mark. ;)
Yes, the root CA has to distribute its self signed certificate (NOT its
private key, just the cert. There seem to be misunderstandings about
that elsewhere) to those who have to trust it. For example if your
employees have to make sure they are on a company website you have to
give them a disk (this is the secure channel here) containing the CA's
certificate and they have to import it into their browsers.

N.B.: Just make sure that your CA certificate is not used to sign fake
certificates, since if your employees trust your CA this also implies
(at least with current browser implementations) that they trust every
certificate signed by your CA, even if you hand out certificates for
www.bigbank.com or www.ebay.com...

>I think I've figured it out, by the way. In the case of the web server,
>the self-signed certificate is not intended for certifying the web site,
>but for certifying the certificate(s) of (a) web site(s), which is why
>two are necessary. 
>  
>
Yes, that sounds correct.

>But in the case of a CA, the certificate is for signing certificates for
>other CAs and won't be given out otherwise. But it would be given out
>with the signed certificates for the subordinate CAs.
>  
>

>But if the root CA machine is also signing server certificates (which it
>should not, but that's another story), it should have a separate
>certificate for signing certificates for servers. Should also have a
>separate piece of the directory tree to do it in.
>  
>
Though a CA can sign other CAs and thereby build longer CA-chains it is
more common in Inhouse-CAs to directly sign end-user (or "end-server")
certificates. And as explained above the self signed certificate of the
root CA has to be distributed.

The approach described by you is a more secure but less practical way.
You typically do this if you are Thawte or Verisign and your root
certificate has to have a very late expiery date, like 25 years from
now. Then it is better to keep the root CA's private(!) keys very very
secure in a bank vault and only use it once a year to sign certificates
for some sub-CAs, which expire in a year or so and are then used to sign
end-user certificates. Now if one of the sub-CAs compromises its private
key, only the certificates singed by this particular sub-CA are void,
and not possibly those of ten or twenty years of work.
But still the root CA's certificate (which apart from management
information primarily contains its signed public(!) key part) has to be
distributed, in the case of Thawte etc. to Bill, the Mozilla project and
people like that.

>Am I getting warm?
>  
>
I think you are already rather close.

Ted
;)

-- 
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 8D26

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to