On Mar 24, 2026, at 8:18 AM, Jeffrey Walton <[email protected]> wrote:
> Regarding Item (2), wouldn't Trust on First Use (TOFU) work well?

  Sure, for some definition of "work".  The traffic would be more secure than 
using raw TCP.

  But there are questions remaining.  Is the server you're connecting to 
actually owned by example.com <http://example.com/>?  Is it authorized?  etc.  
We just don't know.

>   Remember, TLS is only intended to be about as secure as brick-and-mortar 
> stores.  It is not intended to be as secure as Fort Knox.  The biggest threat 
> in mail systems seems to be the mail operator reading your messages.  That's 
> the insider threat in brick-and-mortar stores, where employees are committing 
> an equal amount of the theft as external customers.
> 
> And who needs a CA anyways?  All we need is a hostname and a public key.  We 
> don't need a CA to bind them.  The hostname and public key information is 
> presented in an end-entity certificate, so that's all we need.  The 
> self-signed certificate can be hosted in DNS and retrieved as required since 
> that seems to be the modern equivalent to the X.500 directory.  The world 
> does not need to be adverse to self-signed certificates just because the 
> CA/BF does not care for them.

  I find it a bit surprising that certificates can carry a substantial amount 
of information about purposes, authorization, hierarchies, etc.  But that 
pretty much the only way to make them usable is to just ignore all of that.

  Alan DeKok.

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to