On Sat, 2006-04-08 at 11:20 +0200, Jean-Marc Desperrier wrote:
> Your use case is quite unorthodox, and is at risk of being criticized as 
> such.
[...]
> So, it seems quite contradictory to hope to get non-repudiation if you 
> don't care who the user is. 

This may well be the case; my model is intended to support agents who
aren't necessarily backed by a person (eg, autonomous financial trading
agent). All I want to assure is that decisions made by an particular
entity to receive money are correlated with the decisions made to
disburse it; decisions attested to by cryptographic signatures. But, as
you say, the details of this are entirely secondary to the underlying
issue.

> In fact I agree that it's not the most common but a valid case to be 
> able to use a certificate to sign or authentifiate yourself even if you 
> don't want to mark this CA as trusted for any usage. So this is a bug.

Should I take it upon myself to raise this in bugzilla? I'm not entirely
clear on what the right solution is or even what constraints to
describe; crypto.signText at some point calls a very generic
CERT_VerifyCertificate, which will fail under the described conditions
(no chain back to a root). I presume a good many other certificate
operations take the same path, some of which presumably mandate the
current behaviour.

Which identities should crypto.signText be able to use?
(a) Those for which a CA certificate has been loaded but not trusted?
(b) Any client certificate, regardless of whether or not the signing CA
is known?
(c) Something more exotic, such as (a) above except where the call to
crypto.signText supplies an unknown CA's DN in the ancillary arguments,
in which case any certificates signed by that particular CA are also (or
perhaps exclusively) permitted?

> Meanwhile what you should be able to do is to mark the CA only as 
> trusted for email which limits the risks.

Thanks for confirming that.

m.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to