[10910] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: RSA getting rid of trusted third parties?

daemon@ATHENA.MIT.EDU (Ian Clelland)
Fri Jun 21 15:32:32 2002

Date: Fri, 21 Jun 2002 11:48:00 -0700
From: Ian Clelland <ian@veryfresh.com>
To: cryptography@wasabisystems.com
Cc: Michael_Heyman@NAI.com
Mail-Followup-To: cryptography@wasabisystems.com,
	Michael_Heyman@NAI.com
In-Reply-To: <DBF2F9C6F6BAD211BB1B00A0C99D9702AFC681@ROC-76-201.nai.com>

On Fri, Jun 21, 2002 at 08:28:40AM -0500, Michael_Heyman@NAI.com wrote:
> I came across this interesting announcement by RSA:
> 
> <http://www.rsasecurity.com/news/pr/2002/020619.html>
> 
> Particularly from the above announcement:
> 
>    By using this solution, customers' Web server certificates 
>    generated and issued by their RSA Keon Certificate Authority 
>    (CA) software are designed to be automatically validated - 
>    and therefore trusted - by popular Web browsers, e-mail 
>    packages and other applications that leverage the recognized 
>    issuer lists of these Web browsers.
> 
> This announcement appears to completely break down the trust model assuming
> anybody can host a Keon CA that will issue trusted certificates.

But haven't browsers supported ceritificate chaining for years? As far 
as I can tell, that's all this is - RSA issues you a cert which says 
that you are trusted to create additional certificates (presumably just 
for entities within your organisation).

The trust model doesn't break down just because anyone can create a 
valid X.509 certificate. There still has to be a valid chain of trust 
leading back to a trusted party (RSA, in this case). If that trust is 
abused, then RSA can revoke your cert and break the chain.

Ian Clelland
<ian@veryfresh.com>

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post