[3026] in cryptography@c2.net mail archive
RE: Pseudonymous S/MIME certs?
daemon@ATHENA.MIT.EDU (Brown, R Ken)
Tue Jul 21 12:57:40 1998
From: "Brown, R Ken" <brownrk1@texaco.com>
To: Enzo Michelangeli <em@who.net>, "'Ben Laurie'" <ben@algroup.co.uk>
Cc: cryptography@c2.net
Date: Tue, 21 Jul 1998 10:50:26 -0500
Ben Laurie replied to Enzo Michelangeli
>
>> By the way: are there technical or legal issues preventing someone
from
>> using a personal certificate, issued by Verisign or equivalent, to
initiate
>> a certification chain useable by third parties? The advantage, of
course,
>> would be the inheritance of the trust when the message is received by
>> popular agents which come with the public keys of those CA's built-in
(like
>> Messenger or Outlook Express).
>I think there are legal and common sense issues and possibly technical
>ones, too:
>Technical: I don't know whether enough products actually support cert
>chains (admittedly I've never tested it, but since they are almost
never
>used in real life, I rather doubt anyone else has either).
>Legal: seems to me this would not be a permitted use of an ordinary
>cert.
>Common-sense: just coz I trust A, doesn't mean I trust B who A signed
>for.
Maybe for an individual certificate user. But if Cosmic Mega Corp need
to get into certificates they don't want to be going back to Verisign
(or anyone else) for every one of their server (never mind
individuals). They want to root certificates somewhere in their
corporate headquarters and then issue their own, showing that the
various branches and subsidiaries of the company are trusted and
authorised by the corporate centre. They also want to be able to control
the validity, scope and expiration themselves and to easily be able to
add or remove certificates for test or development servers or projects.
And they want to be able to delegate limited authority to larger
subsidiaries. (When you have branch offices with 50 or 60 servers in
them you don't want to be forced to control everything from the centre,
but you don't want to give the local people all the control either -
there have to be all sorts of checks and balances - which digital
certificates are very compatible with of course)
In fact almost the *last* thing big companies want is branches and
subsidiaries going out on their own and getting Verisign or whoever to
give them certificates. After all, a large bank or well-known
manufacturer probably has a better reputation and a bigger name than
Verisign does.
And I think you are right - there doesn't seem to be any commercially
available software that allows big companies to do this sort of thing
easily, in a way that integrates with the tools they already use for
security/directory management and works with popular Internet servers
and browsers, and also allows one internal CA to trust certificates for
webservers, email, and whatever else needs it (or if there are I can
think of a Mega Corporation who might want to hear about it).
Ken Brown (usual disclaimer - I amd not speaking for Texaco at all)