If the certificates issued by such a CA are only used to authenticate
users of (for example) a web forum, the CA can be run by the web forum
operator -- you trust her to keep her forum relatively secure, but you
don't trust her with your bank account password...

In that case, the relying party is the issuer, so there's no need for
you to have an SLA (since it'd be just a shorthand for putting in your
credentials, all that would be needed would be a forum plugin that
listened on https and either accepted a certificate (and thus created
the session for the account named in the certificate from the mutual
authentication) or asked for username and password, requiring an
additional round trip to establish the session.

If the CA key in this case were compromised, the forum operator could
simply revoke it, create a new one, and all the users with certs
signed by the now-defunct CA would just have to enter their usernames
and passwords and get new authentication certificates.

There are MANY reasons why insisting on certificates only being used
for commercial stuff is outright idiotic, not the least reason of
which is that there's no "sandbox" where they can play with this
technology without fear of unknown consequences.  That is a necessary
precursor to wide acceptance -- the ability to play around without
actual money necessarily being involved.

-Kyle H

On Friday, January 15, 2010, John R Pierce <pie...@hogranch.com> wrote:
> Kyle Hamilton wrote:
>
> I truly, truly wish that people would stop thinking themselves into
> the "crypto box".
>
> A CA needs to be only as secure as the things that its certificates
> secure.  In this case, if they're trying to create user authentication
> certificates for their customers so that they can have the full
> benefits of mutual authentication (which benefits include immunity
> from the recent prefix-injection attack, among others), why shouldn't
> their issuing CA be online?  No entity other than their authentication
> server needs to trust that CA.
>
>
>
> yes, butt if the root private key used by this CA gets compromised, then you 
> can no longer trust anything it signed.   I would not entrust any sort of 
> authoritative private key to a system on which I didn't have some sort of SLA 
> with all parties who had access to the systems and storage.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to