> The issue isn't with certificates; it is with private keys.

I disagree with you...What if somebody deleted the private key from
key3.db and its associated certificate entry in cert8.db??? Then added
his own thing and went around playing with it...???

> You are right that private keys stored in files and protected
> by passwords can be attacked with dictionary attacks, rainbow
> tables, guessing, etc.  The traditional counter-measure is to
> store the private-key in a FIPS 140-2 Level 2/3 certified
> hardware token that will not give up the private-key, and can
> lock up after some configurable number of incorrect password
> attempts.

This arrangement will work fine on the server side; but necessitating
the same thing for every client running the application... will be
cumbersome!!

I would rather be tempted to use the mechanism being used by browsers
like Firefox and AOL communicator etc...
If somebody could shed some light on that, I'd be very glad...

Warm Regards,
D3|\||\|!$

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to