> David Schwartz wrote:

> > Michael Sierchio:

> >> If it's your policy not to reuse keys, or allow their use beyond
> >> the lifespan of the certificate, then the enforcement mechanism
> >> for this MUST be in the CA.
 
> I completely disagree. If this were true, CA's would generate 
> the private key as part of the certificate issuing process.
 
> That doesn't follow.  In any case, the only place where 
> certificate issuing
> policy can be enforced is the RA and/or CA.

Sure, the CA makes the decision whether or not to issue a certificate. However, 
it can't make me use that certificate for anything. If I don't like the 
certificate, for any reason, I can refuse to use it.

The issue was whether the CA is the only place key policy can be enforced. It 
isn't -- I choose what key to use in the CSR, and can enforce any policy I want 
to decide what key to send. The CA can refuse to issue a certificate based on 
the CSR or could, at least in theory, issue a certificate with a completely 
different key in it. But I can also evaluate the key in the certificate when I 
make the decision whether to use the certificate or not.

So there are at least two other places key policy for certificates can be 
enforced other than at the CA's decision to issue the certificate.

If the only place *key* policy could be enforced was the CA, we're in trouble. 
There must be a policy that the private key not be publicly disclosed, and the 
CA has (in typical applications such as the Internet's TLS PKI) no ability to 
enforce this.

> The rest of your argument is
> just as specious, and I could make a career out of correcting your errors,
> but you're determined not to learn.

I agree that all of my arguments are equally specious.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to