-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

dan_mit...@ymp.gov wrote:
| What is to prevent someone from forging a root CA and then creating
| intermediate certificates signed with SHA1, based on the forged root CA?

Nothing.
Now his problem is to get the users to include it into their list
of trusted certs.

I'm inclined to say that if they do that, they get what they deserve,
but on second thought that is a little bit harsh:

Unfortunately users only understand SSL/TLS in the way that if the
browser displays that little lock in front of the URL, they are save.
Additionally they also seem to be trained to click on "accept"
if some annoying window pops open when they want to visit a page.

Often it seems they do not realize that they break the whole security
if they do include a CA certificate they did not verify.


Goetz

- --
DMCA: The greed of the few outweighs the freedom of the many
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJXoFv2iGqZUF3qPYRAg2uAJ0ddzlWLD8ItPglbt1J+ktVCOyBiwCfboyw
rX2TiqnJLPw4hPwwOzygHis=
=oaFw
-----END PGP SIGNATURE-----
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to