>>>So in practice, I _have_ to use a CA that is built into all major browsers.

>>You're assuming a lot here.  Perhaps TLS is broken for all the uses you're 
>>interested in - that doesn't mean it's broken for everyone else's uses.

@Jean-Paul: Granted .. good catch.

My interest is the Web/browser, and also non-browser clients working in a 
Web-compatible way.

>Tobias, all of the things you've said here about browser UI, enterprise 
>networks, and key management tooling are true; however, note that none of 
>those nouns are "TLS".

@Glyph:

I agree: "browser UI" is formally unrelated to TLS
I (mostly) agree: locked down enterprise networks are orthogonal to TLS - 
formally.

And the "key management" system being ortho to TLS: a very good point.

The problem is X.509, and TLS today uses only that, but it is capable of using 
different schemes in principle.

I did some further looking around: turns out there is TLS-PGP

http://tools.ietf.org/html/rfc6091

Does someone know whether OpenSSL supports that?

[Sidenote: if not, one more reason why a pure Python TLS implementation (then 
with RFC6091) would rock. The other reason being the total awesomeness of the 
OpenSSL codebase;) And the third: PyPy.]

> 1. Write some code that uses TLS (which is a wire protocol, after all, not a 
>trust model or set of trust roots, nor a key management UI) and addresses 
>these issues, by implementing a new trust model, protocol for exchanging trust 
>roots, or key management UI, and selecting appropriate ciphers.
> 2. Write some code that uses a brand new wire protocol with unknown, 
>unaudited security properties, also implementing appropriate ciphers, and also 
>implementing all of the things in point 1.

>One of these options seems obviously superior to me :-).

Yeah;) 

1) => RFC6091

>>*This* is probably now sufficiently off-topic, though...

>Man, are there some kind of Topic Police everyone is worried about? Do I need 
>to start taking extra precautions when I write to mailing lists? :-)

Got it. It's just that different communities have different social codes.
But it's good that Twisted has no "Topic Police".
I like that .. term and fact;)

>I think this is on-topic enough, since this might inform TLS work with Twisted 
>in the future, and Vertex has been brought under the Twisted umbrella 
>recently, https://github.com/twisted/vertex and it seeks to provide a 
>different trust model with TLS and Twisted.

Is there any intro / architecture document? I'd like to read more .. 

/Tobias

_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to