On Fri, Sep 28, 2007 at 08:37:12PM +0530, Urjit Gokhale wrote:

> > > > considered as proposition to discussion. Real, secure programming
> should
> > > > be based on existing, well checked protocols (which is possible in
> this
> > > > case).
> > >
> > > The OP was going to embed his CA's private key in his installer.
> >
> > The OP was not thinking clearly about key management. My first response
> > to the OP outlined what needs to be done for key-management (a human
> > assisted enrollment process).
> 
> Thank you all for all the responses and the discussion.
> I learn from this discussion, that for a complete secured system, I need to
> consider the key management in better fashion. I will definitely think over
> it.
> But for now, I would like you guys to comment if  the scheme of allowing the
> admin to create certificate through installer work ?

Turning security off "works", shipping the CA private key to every
machine turns off security.

> I am assuming that the admin will guard the installer (and hence the cert
> generation capability) well, so that no one else gets to create a CA signed
> cert.

This assumption seems unwarranted, and with global distribution of the
CA private key it only takes the compromise of one machine to break
security globally. I'd be hard-pressed to endorsee this design.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to