On Fri, Dec 08, 2006 at 04:15:15AM -0800, David Schwartz wrote:

> 
> > Actually, David, the truth is that your really not getting these
> > guarentees that
> > your looking for.
> 
> Correct. In a technical sense, *you* do not get the guarantees, your end of
> the HTTPS connection does. Whether you choose to trust your end or not is a
> separate issue.

Does this debate belong here? It has been hashed out many times on the
cryptography list, and does not appear to be specific to OpenSSL.

Yes, the security of unauthenticated TLS is rather questionable.

Yes, the security of authenticated TLS with root CAs has many known
issues, but is generally stronger than unauthenticated TLS. Not all CAs
(especially the process they use to verify domains, by e.g. confirming
unauthenticated delivery of email to administrator accounts) are worthy
of the same level of trust. It is difficult to only trust a CA to vouch
for a subset of the DNS namespace, .... The marriage of convenience
between IETF protocols and X.509v3 leaves much to be desired.

I would like to suggest that we leave it there, without additional
rounds of back and forth counter-claims.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to