[3006] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Pseudonymous S/MIME certs?

daemon@ATHENA.MIT.EDU (Ben Laurie)
Mon Jul 20 13:25:47 1998

Date: Mon, 20 Jul 1998 18:18:23 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: Enzo Michelangeli <em@who.net>
CC: cryptography@c2.net

Enzo Michelangeli wrote:
> >Common-sense: just coz I trust A, doesn't mean I trust B who A signed
> >for.
> 
> Still, it could make sense e.g. in a VPN-like environment where A is a
> system administrator (the "Internal CA admin"), and B a generic member of
> the same organization as A and myself, but located remotely. Such an
> arrangement would allow a company with N users to buy from a CA only one
> cert instead of N.

Either action has to be taken to distinguish this single cert from other
certs, or the organisation becomes vulnerable to anyone capable of
signing a cert. If you are going to have to mark this cert as trusted,
why not just install a new CA root cert instead and do away with the
external CA altogether?

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/

WE'RE RECRUITING! http://www.aldigital.co.uk/recruit/

home help back first fref pref prev next nref lref last post