Maybe a TXT record or recordset with the AKIDs that it authorizes to
sign things in that domain?

-Kyle H

On 8/14/06, Balint Balogh <[EMAIL PROTECTED]> wrote:
Hello

> In general, this cannot be done.  It is possible to put "name constraints"
> on CAs that are subordinate to a root CA, but not generally on root CAs.
I was afraid of getting an answer like this but thanks for replying anyway. :)

> The user has control over which CAs he trusts.  If there are CAs in the
> browser's list that the user believes to be untrustworthy, then the user
> can tell his browser to actively distrust them.
User control of that sort is an adequate tool if the issue is about a specific
set of CAs considered untrustworthy in general. However the problem is the
other way around: All except one CA (or set of CAs) are considered
untrustworthy but only for a very specific purpose, they are considered
trustworthy otherwise.

> If you really don't trust any CAs except your own to be truthful to you,
> then you should mark all other CAs but your own as distrusted.
This is not a practical possibility because that would render SSL/TLS secured
browsing and S/MIME secured email correspondence outside of example.com
impossible. (Assuming users are trained to reject any communication attempt
involving invalid certificates, which they should be if we are to talk about
security at all.)

It seems to me this issue is a grave security problem. Fortunately it can be
corrected from the client side alone without touching established protocols
and standards, by allowing users to set local policies about which CAs are
allowed to sign certificates matching certain criteria (e.g. those that belong
to a specific domain).

I would really like to hear others' opinion about this issue.

Regards,
Balint Balogh
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto



--

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to