This should be more widely understood:  an application considers a CA
trusted because some human told it so.  There is no other way.

The "recognized" CAs are trusted by e.g. your browser because the
maker of the browser decided to trust them and so put them into the
list of trusted CAs that is packed in the browser.  Others have
written about the kinds of things those CAs needed to do in order to
gain that trust.  If you decide that you don't trust one of them, you
can take it out and it becomes untrusted *for you*.

If you decide to trust a CA that hasn't made the browser makers'
goodie lists, you can just install it in your browser's list of
trusted CAs and it becomes trusted *for you*.  Anyone else can do that
too, with a similar result for himself.

If any given cert. is calculated to be trusted, that means that, at
the top of the chain, it can be linked back to a cert. that someone
marked manually as trusted.  Trust is not calculable without that.

Really, the only thing protecting most people from rogue CAs is the
browser makers' understanding that they, too, are in a position of
trust, and could be hurt badly by lax acceptance practices no matter
how many disclaimers they slather onto the EULA.  We should all check
and tune our browsers' trust lists.  (No, I haven't.)

-- 
Mark H. Wood, Lead System Programmer   mw...@iupui.edu
Balance your desire for bells and whistles with the reality that only a 
little more than 2 percent of world population has broadband.
        -- Ledford and Tyler, _Google Analytics 2.0_

Attachment: pgp6nnl3aO4Ab.pgp
Description: PGP signature

Reply via email to